docker-compose-files/hyperledger_fabric/latest/raft/logs/dev_peer0.log

7.4 MiB
Raw Blame History

2020-01-03 17:54:32.840 UTC [bccsp] GetDefault -> DEBU 001 Before using BCCSP, please call InitFactories(). Falling back to bootBCCSP.
2020-01-03 17:54:32.924 UTC [bccsp] GetDefault -> DEBU 002 Before using BCCSP, please call InitFactories(). Falling back to bootBCCSP.
[003 01-03 17:54:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done
[004 01-03 17:54:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW]
[005 01-03 17:54:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts
[006 01-03 17:54:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem
[007 01-03 17:54:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts
[008 01-03 17:54:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem
[009 01-03 17:54:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts
[00a 01-03 17:54:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem
[00b 01-03 17:54:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts
[00c 01-03 17:54:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]
[00d 01-03 17:54:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts
[00e 01-03 17:54:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem
[00f 01-03 17:54:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts
[010 01-03 17:54:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]
[011 01-03 17:54:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls
[012 01-03 17:54:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]
[013 01-03 17:54:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs
[014 01-03 17:54:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[015 01-03 17:54:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[016 01-03 17:54:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP
[017 01-03 17:54:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[018 01-03 17:54:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[019 01-03 17:54:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[01a 01-03 17:54:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]...
[01b 01-03 17:54:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
-----END CERTIFICATE-----
[01c 01-03 17:54:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2029-03-29 08:14:00 +0000 UTC
[01d 01-03 17:54:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
-----END CERTIFICATE-----
[01e 01-03 17:54:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[01f 01-03 17:54:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[020 01-03 17:54:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[021 01-03 17:54:33.03 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer:
Version: 2.0.0
Commit SHA: development build
Go version: go1.13.5
OS/Arch: linux/amd64
Chaincode:
Base Docker Namespace: hyperledger
Base Docker Label: org.hyperledger.fabric
Docker Namespace: hyperledger
[022 01-03 17:54:33.04 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051
[023 01-03 17:54:33.04 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051
[024 01-03 17:54:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity
[025 01-03 17:54:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000
[026 01-03 17:54:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925
[027 01-03 17:54:33.16 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled
[028 01-03 17:54:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientstore/]
[029 01-03 17:54:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientstore/] does not exist
[02a 01-03 17:54:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientstore/] exists
[02b 01-03 17:54:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Checking for db format at path [/var/hyperledger/production/transientstore]
[02c 01-03 17:54:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU format is latest, nothing to do
[02d 01-03 17:54:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity
[02e 01-03 17:54:33.27 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051
[02f 01-03 17:54:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[030 01-03 17:54:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
-----END CERTIFICATE-----
[031 01-03 17:54:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[032 01-03 17:54:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[033 01-03 17:54:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[034 01-03 17:54:33.28 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata:
[035 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[036 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A
[037 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B
[038 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added <20>P=_m;<3B><><EFBFBD>_v~<7E><><EFBFBD>uJk8)<29><><EFBFBD>6h<36>56<>-, total items: 1
[039 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started
[03a 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s
[03b 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[03c 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 828F1E7F7B1BDFBDA674F4B89B4AD832F1A36FEE751A9DD0EB829A578208C0A8
[03d 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[03e 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[03f 01-03 17:54:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself
[040 01-03 17:54:33.30 UTC] [%{longpkg}] %{callpath} -> INFO Initializing LedgerMgr
[041 01-03 17:54:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]
[042 01-03 17:54:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist
[043 01-03 17:54:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists
[044 01-03 17:54:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]
[045 01-03 17:54:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist
[046 01-03 17:54:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists
[047 01-03 17:54:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]
[048 01-03 17:54:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist
[049 01-03 17:54:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists
[04a 01-03 17:54:33.46 UTC] [%{longpkg}] %{callpath} -> INFO DB is empty Setting db format as 2.0
[04b 01-03 17:54:33.47 UTC] [%{longpkg}] %{callpath} -> INFO Creating new file ledger directory at /var/hyperledger/production/ledgersData/chains/chains
[04c 01-03 17:54:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]
[04d 01-03 17:54:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist
[04e 01-03 17:54:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists
[04f 01-03 17:54:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Checking for db format at path [/var/hyperledger/production/ledgersData/pvtdataStore]
[050 01-03 17:54:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU format is latest, nothing to do
[051 01-03 17:54:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb
[052 01-03 17:54:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]
[053 01-03 17:54:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist
[054 01-03 17:54:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists
[055 01-03 17:54:33.52 UTC] [%{longpkg}] %{callpath} -> INFO DB is empty Setting db format as 2.0
[056 01-03 17:54:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory
[057 01-03 17:54:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]
[058 01-03 17:54:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist
[059 01-03 17:54:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists
[05a 01-03 17:54:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking for db format at path [/var/hyperledger/production/ledgersData/configHistory]
[05b 01-03 17:54:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU format is latest, nothing to do
[05c 01-03 17:54:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]
[05d 01-03 17:54:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist
[05e 01-03 17:54:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists
[05f 01-03 17:54:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Checking for db format at path [/var/hyperledger/production/ledgersData/bookkeeper]
[060 01-03 17:54:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU format is latest, nothing to do
[061 01-03 17:54:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb
[062 01-03 17:54:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]
[063 01-03 17:54:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist
[064 01-03 17:54:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists
[065 01-03 17:54:33.57 UTC] [%{longpkg}] %{callpath} -> INFO DB is empty Setting db format as 2.0
[066 01-03 17:54:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger
[067 01-03 17:54:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery
[068 01-03 17:54:33.58 UTC] [%{longpkg}] %{callpath} -> INFO Initialized LedgerMgr
[069 01-03 17:54:33.58 UTC] [%{longpkg}] %{callpath} -> INFO Initialized lifecycle cache with 0 already installed chaincodes
[06a 01-03 17:54:33.58 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com
[06b 01-03 17:54:33.58 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052
[06c 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer
[06d 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO deploying system chaincode 'lscc'
[06e 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc.syscc
[06f 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU starting chaincode-support stream for lscc.syscc
[070 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[071 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[072 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc.syscc
[073 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = lscc.syscc, sending back REGISTERED
[074 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for lscc.syscc
[075 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode lscc.syscc
[076 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode lscc.syscc
[077 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO deploying system chaincode 'cscc'
[078 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc.syscc
[079 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU starting chaincode-support stream for cscc.syscc
[07a 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[07b 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[07c 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc.syscc
[07d 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = cscc.syscc, sending back REGISTERED
[07e 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for cscc.syscc
[07f 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode cscc.syscc
[080 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode cscc.syscc
[081 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO deploying system chaincode 'qscc'
[082 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc.syscc
[083 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU starting chaincode-support stream for qscc.syscc
[084 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[085 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[086 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc.syscc
[087 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = qscc.syscc, sending back REGISTERED
[088 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for qscc.syscc
[089 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode qscc.syscc
[08a 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode qscc.syscc
[08b 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO deploying system chaincode '_lifecycle'
[08c 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for _lifecycle.syscc
[08d 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU starting chaincode-support stream for _lifecycle.syscc
[08e 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[08f 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[090 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode _lifecycle.syscc
[091 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = _lifecycle.syscc, sending back REGISTERED
[092 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for _lifecycle.syscc
[093 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode _lifecycle.syscc
[094 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode _lifecycle.syscc
[095 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes
[096 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000
[097 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated
[098 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[peer0.org1.example.com], network ID=[dev], address=[peer0.org1.example.com:7051]
[099 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[peer0.org1.example.com], network ID=[dev], address=[peer0.org1.example.com:7051]
[09a 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]
[09b 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Loading Pre-reset heights
[09c 01-03 17:54:33.62 UTC] [%{longpkg}] %{callpath} -> INFO No active channels passed
[09d 01-03 17:54:33.96 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:35.968Z grpc.peer_address=172.18.0.5:57744 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=191.2µs
[09e 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[09f 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[0a0 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:57744
[0a1 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:57744
[0a2 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[0a3 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[0a4 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[0a5 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[0a6 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|
[0a7 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 9c cd e5 bb b7 af 93 96 60 c3 |0E.!..........`.|
00000010 a1 1a 9e 09 d7 96 3f 3e ce af 9a 20 10 04 17 ca |......?>... ....|
00000020 07 c7 62 e7 5d 02 20 7e 26 08 b5 57 7e a9 d0 77 |..b.]. ~&..W~..w|
00000030 c3 9d b7 04 cb 1e ef 9c f4 a9 7e 29 9e 68 a9 49 |..........~).h.I|
00000040 42 66 36 ae fa 05 98 |Bf6....|
[0a8 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:57744
[0a9 01-03 17:54:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:57744
[0aa 01-03 17:54:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[0ab 01-03 17:54:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[0ac 01-03 17:54:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:57744 disconnected
[0ad 01-03 17:54:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[0ae 01-03 17:54:33.99 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:54:43.974Z grpc.peer_address=172.18.0.5:57744 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.857ms
[0af 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:36.002Z grpc.peer_address=172.18.0.5:57746 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=125µs
[0b0 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[0b1 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[0b2 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:57746
[0b3 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:57746
[0b4 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|
[0b5 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 d4 ba 04 bf 88 6f d7 bc 3c 8f |0E.!.......o..<.|
00000010 ce f1 72 2c de ec dc 8e 6f 59 89 7c 52 00 c8 b0 |..r,....oY.|R...|
00000020 83 83 91 a9 90 02 20 1f 2c 96 41 d3 fa 65 ed 69 |...... .,.A..e.i|
00000030 2f 00 cb 7d 7b fc 65 24 c9 cf cb bb 48 dc 1a d9 |/..}{.e$....H...|
00000040 f5 df 02 cb c3 7c 0a |.....|.|
[0b6 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:57746
[0b7 01-03 17:54:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:57746
[0b8 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 15840488196094730103, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1108 bytes, Signature: 0 bytes
[0b9 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0ba 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 15840488196094730103, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1108 bytes, Signature: 0 bytes
[0bb 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 33 0f 9c f7 50 6e 12 f1 c5 7d e7 65 15 b1 8c |.3...Pn...}.e...|
00000010 93 03 2e 56 a7 41 7d 81 37 94 20 7e 87 44 ff 32 |...V.A}.7. ~.D.2|
[0bc 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 e4 54 42 a0 77 c9 33 ff 60 81 73 |0D. '.TB.w.3.`.s|
00000010 16 ae 69 9a 72 aa 6e 0e a8 9d 66 df 06 05 27 4c |..i.r.n...f...'L|
00000020 20 06 2d b3 02 20 0c 14 87 e4 50 09 4f 6a ba f3 | .-.. ....P.Oj..|
00000030 6e 90 2f e3 49 86 63 55 9d 46 98 e0 d2 22 f5 d9 |n./.I.cU.F..."..|
00000040 86 59 cf fa b3 ca |.Y....|
[0bd 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[0be 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f3 aa 92 4b cb cb 72 40 a9 30 10 |0D. c...K..r@.0.|
00000010 59 ad 56 9f 94 7f c9 37 e6 0c 8e 95 90 f8 d2 23 |Y.V....7.......#|
00000020 4a f1 d5 da 02 20 31 5a f1 b0 83 64 c3 16 27 fc |J.... 1Z...d..'.|
00000030 1a b7 00 08 0b 28 2b 54 84 d2 48 e9 5d 11 7c 77 |.....(+T..H.].|w|
00000040 5e c7 f5 8f c0 3b |^....;|
[0bf 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[0c0 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]}
[0c1 01-03 17:54:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[0c2 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0c3 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0c4 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0c5 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[0c6 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[0c7 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3EF00F9E82B573415F97892EAA62A516EA3E4927478F043329B118EDE88E14FA
[0c8 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[0c9 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[0ca 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 15840488196094730103, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes to 1 peers
[0cb 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15840488196094730103, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes
[0cc 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0cd 01-03 17:54:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[0ce 01-03 17:54:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:9397538236333023602 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[0cf 01-03 17:54:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9397538236333023602 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[0d0 01-03 17:54:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[0d1 01-03 17:54:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0d2 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes
[0d3 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0d4 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes
[0d5 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 51 cb 82 ed cf 59 61 b8 48 1d 32 19 53 df 4a |.Q....Ya.H.2.S.J|
00000010 5f 43 2d 13 68 38 ab 34 7c b3 33 62 af 65 32 ab |_C-.h8.4|.3b.e2.|
[0d6 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 b9 c8 b0 f5 a2 df b7 14 ba 72 |0E.!...........r|
00000010 be 86 ac d3 6e ae a2 96 9a 56 6a 5c db 19 f8 6c |....n....Vj\...l|
00000020 be b9 f3 1e cb 02 20 64 2a a4 f7 00 d2 3f b7 df |...... d*....?..|
00000030 df 66 56 86 a6 00 81 63 2e 7f 48 ad 1f 63 43 34 |.fV....c..H..cC4|
00000040 54 40 0d c4 3b b7 3d |T@..;.=|
[0d7 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[0d8 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a8 9e 8a 6c 60 d7 ac e4 b5 60 a6 |0D. ....l`....`.|
00000010 39 d2 a2 8c 80 95 6e 03 97 4d 98 88 87 53 6d 9d |9.....n..M...Sm.|
00000020 f9 d7 e3 a6 02 20 7c 55 10 59 f3 af 80 da 4c ff |..... |U.Y....L.|
00000030 e1 12 19 b5 ab a8 6a d4 99 ca 42 97 9a 1f cd 3b |......j...B....;|
00000040 6d f6 85 4c b0 3e |m..L.>|
[0d9 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[0da 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[0db 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:4
[0dc 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:4
[0dd 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[0de 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0df 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0e0 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0e1 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[0e2 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[0e3 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 143DD08037101C60B3A67CF1FA9801021DCF7F1C74565F2EAB11BB4F433DDFB5
[0e4 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[0e5 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[0e6 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers
[0e7 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[0e8 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes
[0e9 01-03 17:54:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0ea 01-03 17:54:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 9397538236333023602 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes
[0eb 01-03 17:54:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 9397538236333023602 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes
[0ec 01-03 17:54:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0ed 01-03 17:54:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[0ee 01-03 17:54:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0ef 01-03 17:54:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[0f0 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[0f1 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 13 a3 0b c3 9f 2f 19 16 74 90 6b ce 11 61 9e |....../..t.k..a.|
00000010 3f f0 c5 ed ad dc 55 53 4b a2 9c f7 f6 59 fd 73 |?.....USK....Y.s|
[0f2 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 91 4d 48 5b 46 27 58 a5 f6 55 ae |0D. ..MH[F'X..U.|
00000010 cc 09 af 3d 30 44 d0 6e 67 fd 75 e3 7d 6a 78 7a |...=0D.ng.u.}jxz|
00000020 94 59 8b a6 02 20 05 11 86 d1 89 dc 2b 04 97 80 |.Y... ......+...|
00000030 a9 62 29 0c 72 81 4c cd eb 2c 7a d9 59 c4 d9 3c |.b).r.L..,z.Y..<|
00000040 30 fd 10 34 97 76 |0..4.v|
[0f3 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[0f4 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 0a 6f 65 1e 9b 2a e7 03 14 18 17 |0D. {.oe..*.....|
00000010 28 4b 01 f8 40 37 68 c1 41 8a fe 71 ad 65 bd b1 |(K..@7h.A..q.e..|
00000020 b8 90 9c 74 02 20 76 0c de 19 71 29 a1 e5 a5 79 |...t. v...q)...y|
00000030 f4 72 46 dd 00 fc 32 f3 28 d0 0d f6 09 44 02 6f |.rF...2.(....D.o|
00000040 29 c2 e1 e5 f8 9f |).....|
[0f5 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[0f6 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[0f7 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:5
[0f8 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:5
[0f9 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:4 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[0fa 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0fb 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0fc 01-03 17:54:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0fd 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[0fe 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:171127488880216416 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[0ff 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:171127488880216416 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[100 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[101 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 171127488880216416 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes
[102 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 171127488880216416 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes
[103 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[104 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[105 01-03 17:54:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF7C8D67C59D851205714791CE0F28AEB7E08D4D4FE384F88178172B7C224C4E
[106 01-03 17:54:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[107 01-03 17:54:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[108 01-03 17:54:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:5 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers
[109 01-03 17:54:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:5 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1095 bytes, Signature: 0 bytes
[10a 01-03 17:54:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10b 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes
[10c 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10d 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes
[10e 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 7c 8d 67 c5 9d 85 12 05 71 47 91 ce 0f 28 ae |.|.g.....qG...(.|
00000010 b7 e0 8d 4d 4f e3 84 f8 81 78 17 2b 7c 22 4c 4e |...MO....x.+|"LN|
[10f 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 39 71 d1 a6 40 d3 ce e5 1c 4b |0E.!..9q..@....K|
00000010 3d 9c c1 79 0c 0a 62 03 fc b6 20 84 d2 a2 99 79 |=..y..b... ....y|
00000020 fb 6d fe 2e 3b 02 20 77 34 0e d7 72 e2 89 4a e6 |.m..;. w4..r..J.|
00000030 6c 6d f9 9d 78 e3 42 6a fa 3a 80 e9 9c a4 e7 80 |lm..x.Bj.:......|
00000040 58 1c 7c 04 f7 b2 6e |X.|...n|
[110 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[111 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 e2 28 e0 83 6f 1f d6 60 f1 1d |0E.!...(..o..`..|
00000010 e9 82 b0 e6 ab c0 f9 3c 29 ff 6d dc 5e 6e 71 b0 |.......<).m.^nq.|
00000020 5c f8 4c a3 75 02 20 38 55 10 4b 3c 42 c5 8b 30 |\.L.u. 8U.K<B..0|
00000030 cf d8 35 5c ad 28 fc e1 5b 80 98 67 06 7d 7d d6 |..5\.(..[..g.}}.|
00000040 78 ab 99 b0 af 23 55 |x....#U|
[112 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:5 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[113 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:5 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[114 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[115 01-03 17:54:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[116 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[117 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B945B65DEA8DD15078D5B01864964DA31B38B579F206EEA4E1639989DB9B1C7F
[118 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[119 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[11a 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[11b 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051
[11c 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 171127488880216416 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes to 1 peers
[11d 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 171127488880216416 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes
[11e 01-03 17:54:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11f 01-03 17:54:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:6 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[120 01-03 17:54:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:6 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[121 01-03 17:54:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[122 01-03 17:54:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 171127488880216416, Envelope: 960 bytes, Signature: 0 bytes
[123 01-03 17:54:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.|
00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|
[124 01-03 17:54:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 82 78 b7 13 b8 ee b1 30 7c fb 21 |0D. ..x.....0|.!|
00000010 c8 6d be 40 04 32 7e 3d 8b f3 4a 0d c5 82 cb 64 |.m.@.2~=..J....d|
00000020 a4 62 96 94 02 20 03 67 58 fb 28 85 0b a7 9f ec |.b... .gX.(.....|
00000030 f0 16 5d 37 56 78 de 93 ad 8b 82 5e 27 40 6b 4d |..]7Vx.....^'@kM|
00000040 87 53 b2 c6 28 49 |.S..(I|
[125 01-03 17:54:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 171127488880216416, Envelope: 960 bytes, Signature: 0 bytes
[126 01-03 17:54:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]
[127 01-03 17:54:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Added <20><><0F><><EFBFBD>l<EFBFBD>J<EFBFBD>m[|<7C><><EFBFBD>>}<7D><><EFBFBD>Adӊz<D38A>Q2b<32> to the in memory item map, total items: 2
[128 01-03 17:54:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[129 01-03 17:54:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:10969246140721562435 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[12a 01-03 17:54:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10969246140721562435 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[12b 01-03 17:54:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[12c 01-03 17:54:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12d 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes
[12e 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12f 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes
[130 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 60 15 51 99 11 a5 2f e6 b6 83 6b 4a f0 0c 74 |.`.Q.../...kJ..t|
00000010 d0 69 d3 4c 82 b1 6b c7 99 62 64 9a 4a 1e 3f dc |.i.L..k..bd.J.?.|
[131 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 db af ea 9f 60 d2 cd b4 50 f5 |0E.!......`...P.|
00000010 b0 f7 8f 13 85 47 d5 21 1c 0f 1b b4 f6 77 f1 55 |.....G.!.....w.U|
00000020 c1 5c 0c ed 9c 02 20 1c 58 26 9e 76 69 b2 d1 44 |.\.... .X&.vi..D|
00000030 fe 37 72 2c d0 ee 3b b8 94 ca 7d 70 47 d2 a1 6c |.7r,..;...}pG..l|
00000040 42 04 5a a3 06 ae 00 |B.Z....|
[132 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[133 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 06 90 f4 a6 a8 a0 ca 92 5a 3b 9c |0D. z........Z;.|
00000010 ad f5 24 0b 63 9b ca b8 40 d5 59 2c 8d 43 13 47 |..$.c...@.Y,.C.G|
00000020 be 60 4a 09 02 20 68 63 12 40 2a c5 b0 8a ac c1 |.`J.. hc.@*.....|
00000030 c1 b3 9d b2 e1 60 b6 4d 92 b6 d7 01 af d1 e8 99 |.....`.M........|
00000040 6a ab 6c 45 86 0d |j.lE..|
[134 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[135 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[136 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:6
[137 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:6
[138 01-03 17:54:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[139 01-03 17:54:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13a 01-03 17:54:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13b 01-03 17:54:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[13c 01-03 17:54:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers
[13d 01-03 17:54:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[13e 01-03 17:54:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes
[13f 01-03 17:54:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[140 01-03 17:54:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[141 01-03 17:54:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[142 01-03 17:54:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12761516681732495297 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[143 01-03 17:54:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12761516681732495297 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[144 01-03 17:54:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[145 01-03 17:54:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12761516681732495297 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes
[146 01-03 17:54:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12761516681732495297 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes
[147 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[148 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[149 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1956567D22111038DA635F2897C3C35FC80AAFC1809C38452B3C3935506577DA
[14a 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[14b 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[14c 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers
[14d 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes
[14e 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14f 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes
[150 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[151 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes
[152 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 56 56 7d 22 11 10 38 da 63 5f 28 97 c3 c3 5f |.VV}"..8.c_(..._|
00000010 c8 0a af c1 80 9c 38 45 2b 3c 39 35 50 65 77 da |......8E+<95Pew.|
[153 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 05 eb 0a d1 60 5d 1b e8 05 31 |0E.!......`]...1|
00000010 53 69 0a 11 21 a8 33 0f ee 61 aa 5d 2d ae 92 d9 |Si..!.3..a.]-...|
00000020 a4 73 0f 82 01 02 20 29 80 73 cf 11 26 22 97 b3 |.s.... ).s..&"..|
00000030 e8 e4 ce 9d 00 8e 77 80 80 f3 e5 4c 34 e0 ce 2d |......w....L4..-|
00000040 20 27 3a 9a cc cf 48 | ':...H|
[154 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[155 01-03 17:54:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c a2 3e ba 96 da be 1f 34 11 a5 59 |0D. ,.>.....4..Y|
00000010 d3 6a 36 88 c1 9f 3a 6c e7 60 6e c5 ea fe 52 29 |.j6...:l.`n...R)|
00000020 df f2 28 07 02 20 4f 89 3b e7 49 c1 1b cd 6c 37 |..(.. O.;.I...l7|
00000030 d3 46 a8 ea c2 35 c0 81 45 6b dc e4 c1 e6 6f a5 |.F...5..Ek....o.|
00000040 f7 3d 0f 70 17 88 |.=.p..|
[156 01-03 17:54:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[157 01-03 17:54:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns
FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6
5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f
whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig
-----END CERTIFICATE-----
Timestamp:inc_num:1578074073288893700 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[158 01-03 17:54:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[159 01-03 17:54:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15a 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:7 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[15b 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15c 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:7 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[15d 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[15e 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 92 6e fb a2 1f 0c 06 41 ea f6 b4 ae 89 2b 4d |%.n.....A.....+M|
00000010 40 57 a0 e1 f5 84 5d bf 47 bd f5 61 6a 4d ec da |@W....].G..ajM..|
[15f 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 d0 c8 91 87 01 9a 31 27 45 20 |0E.!........1'E |
00000010 6e af 54 a5 14 b9 17 5b f5 2d cb 7a 26 0d ae 39 |n.T....[.-.z&..9|
00000020 3e 8c 62 8b 60 02 20 13 c3 02 10 f6 c0 c9 cb f9 |>.b.`. .........|
00000030 bf 80 b2 ff 5c c7 4f 36 bf 09 35 f1 3a 91 e6 e8 |....\.O6..5.:...|
00000040 20 32 e0 a7 c3 5d 1d | 2...].|
[160 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[161 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 57 56 52 0d f8 8a ad 25 80 2d 32 |0D. 9WVR....%.-2|
00000010 18 44 60 0b 6b 05 c6 e6 55 48 51 00 6a 2c 91 c6 |.D`.k...UHQ.j,..|
00000020 98 9f ca 92 02 20 76 78 64 75 f5 ac 0c 51 5e 95 |..... vxdu...Q^.|
00000030 88 a3 4b d0 07 fa 70 46 f2 f8 0d 32 0f 21 9e 43 |..K...pF...2.!.C|
00000040 80 30 4d 0c 1d 27 |.0M..'|
[162 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:7 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[163 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:7 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[164 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:7
[165 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:7
[166 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1578074071871625600 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[167 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[168 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[169 01-03 17:54:41.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16a 01-03 17:54:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151008
[16b 01-03 17:54:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2F7A9F88219CF338619F4B7D7A3BE74C5A823B1C390F9D4356C5E6227F7352A4
[16c 01-03 17:54:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[16d 01-03 17:54:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[16e 01-03 17:54:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[16f 01-03 17:54:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[170 01-03 17:54:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[171 01-03 17:54:43.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[172 01-03 17:54:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:12084896837527145041 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[173 01-03 17:54:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12084896837527145041 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[174 01-03 17:54:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[175 01-03 17:54:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[176 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[177 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[178 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[179 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[17a 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d a2 be e9 6d eb f1 e3 53 2e db 38 18 ca c1 62 |=...m...S..8...b|
00000010 e6 c1 98 ee 83 a9 80 5b 43 bc e7 6b e1 d5 3d b1 |.......[C..k..=.|
[17b 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 59 d3 0f fe 7f 85 12 d6 df a4 |0E.!..Y.........|
00000010 24 38 3e 73 32 92 36 05 ca a9 f2 b4 51 a1 2b 6a |$8>s2.6.....Q.+j|
00000020 e3 fc 1c 14 7a 02 20 35 db 92 85 b8 ef df 4c 37 |....z. 5......L7|
00000030 a0 8b 29 3b 31 31 27 75 c9 b4 b3 fc d3 ac 5e 30 |..);11'u......^0|
00000040 ac 64 3a ed 1f 56 a9 |.d:..V.|
[17c 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[17d 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 04 dc ce 50 f6 97 66 25 1f 87 68 |0D. ....P..f%..h|
00000010 ac 49 23 c8 d4 8e a5 19 6c 49 35 4b 60 e3 0b 4c |.I#.....lI5K`..L|
00000020 d0 17 12 6a 02 20 24 da 8b a5 fd 62 1f 90 f9 96 |...j. $....b....|
00000030 34 ec ff 1a 50 26 fa d2 18 73 da 2f be 78 50 9e |4...P&...s./.xP.|
00000040 f2 5d 10 50 07 59 |.].P.Y|
[17e 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[17f 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[180 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:8
[181 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:8
[182 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:7 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[183 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[184 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[185 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[186 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[187 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[188 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[189 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[18a 01-03 17:54:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18b 01-03 17:54:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[18c 01-03 17:54:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17338117961041604993 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[18d 01-03 17:54:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17338117961041604993 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[18e 01-03 17:54:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18f 01-03 17:54:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17338117961041604993 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes
[190 01-03 17:54:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17338117961041604993 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes
[191 01-03 17:54:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[192 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151009
[193 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DCAFF347B1E03ABBCB30F49B01C81517E3FD5A94965412C0AB2418CEC05E374F
[194 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[195 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[196 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[197 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[198 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[199 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[19a 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19b 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[19c 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[19d 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc af f3 47 b1 e0 3a bb cb 30 f4 9b 01 c8 15 17 |...G..:..0......|
00000010 e3 fd 5a 94 96 54 12 c0 ab 24 18 ce c0 5e 37 4f |..Z..T...$...^7O|
[19e 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 29 cd 78 ab 2b 0d 2b 05 6d c6 5b |0D. Y).x.+.+.m.[|
00000010 c5 61 97 26 91 5f 7c 88 e8 33 fc f0 de b1 f1 2c |.a.&._|..3.....,|
00000020 9e 38 34 9e 02 20 16 2b b0 b9 73 70 61 5d 71 3c |.84.. .+..spa]q<|
00000030 ab 5b d5 8b 87 76 b2 2a d5 d9 3d 6c 93 c6 17 6a |.[...v.*..=l...j|
00000040 ff 0c 8a 5d 7f b6 |...]..|
[19f 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1a0 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c d2 3f 0d 3c 46 29 db 3e 21 7d bb |0D. \.?.<F).>!}.|
00000010 3d 0b 02 f1 5d 52 c5 dc a1 dd d6 9a e0 c3 ad 4f |=...]R.........O|
00000020 09 80 32 35 02 20 52 0b 81 d4 16 24 11 5f ff 14 |..25. R....$._..|
00000030 2d 71 72 5a 3b c7 a4 08 f0 a5 31 f5 90 f0 40 af |-qrZ;.....1...@.|
00000040 08 20 19 62 a8 68 |. .b.h|
[1a1 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1a2 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1a3 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a4 01-03 17:54:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a5 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57414
[1a6 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a7 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[1a8 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU a4a05972bd7ec51330b62ab905be023c56d604cce30c40df7c6b06bc62bd9d25 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[1a9 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[1aa 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[1ab 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU a4a05972bd7ec51330b62ab905be023c56d604cce30c40df7c6b06bc62bd9d25 creator is valid
[1ac 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 22 c3 57 2a 0f b0 a3 c3 22 85 0a 69 a0 b8 da |.".W*...."..i...|
00000010 cb d7 51 5b 81 b3 27 d1 42 fb 45 25 7b e7 f8 d2 |..Q[..'.B.E%{...|
[1ad 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 6b a2 d8 7c 0f 52 ac 08 f9 0f |0E.!..k..|.R....|
00000010 50 ad 48 61 8c b6 56 fa cc 43 04 50 62 0b 7c 00 |P.Ha..V..C.Pb.|.|
00000020 f1 00 e0 2c a7 02 20 34 b1 c2 cf a2 a1 2d 1c a9 |...,.. 4.....-..|
00000030 3b 72 b1 ba 3f 92 ce 5f a0 f1 b4 81 f3 d6 de bf |;r..?.._........|
00000040 30 ed e9 d6 30 9a 4e |0...0.N|
[1ae 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU a4a05972bd7ec51330b62ab905be023c56d604cce30c40df7c6b06bc62bd9d25 signature is valid
[1af 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU [][a4a05972] processing txid: a4a05972bd7ec51330b62ab905be023c56d604cce30c40df7c6b06bc62bd9d25
[1b0 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU [][a4a05972] Entry chaincode: cscc
[1b1 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> INFO [][a4a05972] Entry chaincode: cscc
[1b2 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU [a4a05972] getting chaincode data for cscc on channel
[1b3 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[1b4 01-03 17:54:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain
[1b5 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[1b6 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[1b7 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[1b8 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[1b9 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[1ba 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[1bb 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[1bc 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[1bd 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[1be 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[1bf 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[1c0 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[1c1 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[1c2 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[1c3 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[1c4 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[1c5 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[1c6 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[1c7 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[1c8 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[1c9 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[1ca 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[1cb 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
[1cc 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[1cd 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[1ce 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[1cf 01-03 17:54:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[1d0 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[1d1 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[1d2 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[1d3 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[1d4 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are
[1d5 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[1d6 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[1d7 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[1d8 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[1d9 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[1da 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[1db 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[1dc 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[1dd 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[1de 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[1df 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[1e0 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[1e1 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[1e2 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are
[1e3 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[1e4 01-03 17:54:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[1e5 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[1e6 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[1e7 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[1e8 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e
gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ
l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI
zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF
1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==
-----END CERTIFICATE-----
[1e9 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[1ea 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[1eb 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[1ec 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps)
[1ed 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps
[1ee 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[1ef 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[1f0 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP
[1f1 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 22 c3 57 2a 0f b0 a3 c3 22 85 0a 69 a0 b8 da |.".W*...."..i...|
00000010 cb d7 51 5b 81 b3 27 d1 42 fb 45 25 7b e7 f8 d2 |..Q[..'.B.E%{...|
[1f2 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 6b a2 d8 7c 0f 52 ac 08 f9 0f |0E.!..k..|.R....|
00000010 50 ad 48 61 8c b6 56 fa cc 43 04 50 62 0b 7c 00 |P.Ha..V..C.Pb.|.|
00000020 f1 00 e0 2c a7 02 20 34 b1 c2 cf a2 a1 2d 1c a9 |...,.. 4.....-..|
00000030 3b 72 b1 ba 3f 92 ce 5f a0 f1 b4 81 f3 d6 de bf |;r..?.._........|
00000040 30 ed e9 d6 30 9a 4e |0...0.N|
[1f3 01-03 17:54:45.48 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block
[1f4 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel
[1f5 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]
[1f6 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist
[1f7 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists
[1f8 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage
[1f9 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files
[1fa 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix()
[1fb 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1
[1fc 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1
[1fd 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found
[1fe 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0001ad4a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])
[1ff 01-03 17:54:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum]]
[200 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0]
[201 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events
[202 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]
[203 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel:
[204 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = []
[205 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]
[206 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[207 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty
[208 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false
[209 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB()
[20a 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty.
[20b 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions
[20c 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB
[20d 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[20e 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database
[20f 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries
[210 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]
[211 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] ineligible missing data entries to eligible
[212 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event
[213 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0]
[214 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[215 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[216 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[217 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0]
[218 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[219 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG
[21a 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG]
[21b 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.ConfigTxProcessor{}
[21c 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[21d 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = []
[21e 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG
[21f 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[220 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[221 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]
[222 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"CHANNEL_CONFIG_ENV_BYTES"}:(*internal.keyOps)(0xc0029a6840)}
[223 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[224 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[225 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[226 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0]
[227 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage
[228 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store
[229 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0]
[22a 01-03 17:54:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0]
[22b 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0]
[22c 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}
[22d 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]
[22e 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished
[22f 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x70, 0x4d, 0x52, 0xe9, 0x9f, 0xf1, 0xcf, 0x49, 0x3f, 0x1f, 0x3c, 0xb4, 0x52, 0x7d, 0x2b, 0x97, 0x9d, 0x86, 0x2b, 0xe8, 0xef, 0x84, 0x5f, 0xf3, 0x3b, 0xa2, 0x11, 0x75, 0xe2, 0x92, 0x55, 0xcc} txOffsets=
txId=a69a44face1d065791dbf80d38460514d32509b82d41fee3ccf9152b585ce864 locPointer=offset=39, bytesLength=23896
]
[230 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx ID: [a69a44face1d065791dbf80d38460514d32509b82d41fee3ccf9152b585ce864] to txid-index
[231 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx number:[0] ID: [a69a44face1d065791dbf80d38460514d32509b82d41fee3ccf9152b585ce864] to blockNumTranNum index
[232 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23942], isChainEmpty=[false], lastBlockNumber=[0]
[233 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database
[234 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[235 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0]
[236 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]
[237 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0]
[238 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[239 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[23a 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[23b 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dCHANNEL_CONFIG_ENV_BYTES] key(bytes)=[[]byte{0x64, 0x0, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x45, 0x4e, 0x56, 0x5f, 0x42, 0x59, 0x54, 0x45, 0x53}]
[23c 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[23d 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1]
[23e 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]
[23f 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1]
[240 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[241 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database
[242 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions
[243 01-03 17:54:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction
[244 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0]
[245 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 15ms (state_validation=0ms block_and_pvtdata_commit=5ms state_commit=5ms) commitHash=[]
[246 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block
[247 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [59a26f6b-386f-4be8-8d92-eb3f42a29805]
[248 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=CHANNEL_CONFIG_ENV_BYTES
[249 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [59a26f6b-386f-4be8-8d92-eb3f42a29805]
[24a 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[24b 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[24c 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[24d 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[24e 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[24f 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[250 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[251 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[252 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[253 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[254 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[255 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[256 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[257 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[258 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[259 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[25a 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[25b 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[25c 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[25d 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[25e 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[25f 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[260 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
[261 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[262 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[263 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[264 01-03 17:54:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[265 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[266 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[267 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[268 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[269 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are
[26a 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[26b 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[26c 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[26d 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[26e 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[26f 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv
cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb
r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk
RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD
VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI
zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw
TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==
-----END CERTIFICATE-----
[270 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[271 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[272 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[273 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[274 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[275 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[276 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[277 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are
[278 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[279 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[27a 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[27b 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[27c 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[27d 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[27e 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[27f 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[280 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[281 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps)
[282 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps
[283 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg
[284 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg
[285 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg
[286 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer
[287 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer
[288 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer
[289 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer
[28a 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP
[28b 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP
[28c 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP
[28d 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP
[28e 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP
[28f 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP
[290 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP
[291 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP
[292 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application
[293 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application
[294 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application
[295 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application
[296 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application
[297 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel
[298 01-03 17:54:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel
[299 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel
[29a 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[29b 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer
[29c 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg
[29d 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP
[29e 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins
[29f 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers
[2a0 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers
[2a1 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType
[2a2 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize
[2a3 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout
[2a4 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions
[2a5 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities
[2a6 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers
[2a7 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers
[2a8 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins
[2a9 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation
[2aa 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[2ab 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[2ac 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[2ad 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[2ae 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[2af 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[2b0 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[2b1 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[2b2 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[2b3 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[2b4 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[2b5 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[2b6 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[2b7 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[2b8 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[2b9 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[2ba 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[2bb 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[2bc 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[2bd 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[2be 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm
[2bf 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium
[2c0 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure
[2c1 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses
[2c2 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities
[2c3 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers
[2c4 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins
[2c5 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers
[2c6 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[2c7 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[2c8 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers'
[2c9 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers'
[2ca 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[2cb 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[2cc 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[2cd 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[2ce 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[2cf 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[2d0 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers'
[2d1 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers'
[2d2 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins'
[2d3 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer]
[2d4 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[2d5 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[2d6 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path []
[2d7 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg
[2d8 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation'
[2d9 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins'
[2da 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers'
[2db 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers'
[2dc 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing updates for orderer endpoints channel=businesschannel
[2dd 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found orderer org 'OrdererOrg' has updates channel=businesschannel
[2de 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU There are no org endpoints, but the global addresses have changed channel=businesschannel
[2df 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning an orderer connection pool source with global endpoints only channel=businesschannel
[2e0 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel
[2e1 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel
[2e2 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: []
[2e3 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: []
[2e4 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[2e5 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations
[2e6 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about
[2e7 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about
[2e8 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel
[2e9 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP]
[2ea 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP]
[2eb 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[2ec 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000
[2ed 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925
[2ee 01-03 17:54:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled
[2ef 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1
[2f0 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1
[2f1 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408908FF491D1C09CF315...624D0F542C442AB5FE8C65C22A020801
[2f2 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8807E898836DC6F3BAD435C3E63E4C6EA51F9466734697DD84CB6BB645DE8D5D
[2f3 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel
[2f4 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel
[2f5 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[2f6 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [99348b46-e239-48f4-ad53-4f9b10d5dc74]
[2f7 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning []
[2f8 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [99348b46-e239-48f4-ad53-4f9b10d5dc74]
[2f9 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[2fa 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408908FF491D1C09CF315...624D0F542C442AB5FE8C65C22A020801
[2fb 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9BE9581F19E4CDA6E6B163F86DBC1D17E725AF7B8D8AEFDF11CBEE9D0210185A
[2fc 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked
[2fd 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU [a4a05972] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[2fe 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU [a4a05972] notifying Txid:a4a05972bd7ec51330b62ab905be023c56d604cce30c40df7c6b06bc62bd9d25, channelID:
[2ff 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[300 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> INFO [][a4a05972] Exit chaincode: cscc (96ms)
[301 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU [][a4a05972] Exit
[302 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57414
[303 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57414 grpc.code=OK grpc.call_duration=99.0121ms
[304 01-03 17:54:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[305 01-03 17:54:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 0
[306 01-03 17:54:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[307 01-03 17:54:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[308 01-03 17:54:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[309 01-03 17:54:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08CCFAFB94D1C09CF3151001
[30a 01-03 17:54:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9C635BC6363234F53B0B710311F6EB5A555905261E44B5503F986E136C6C78DA
[30b 01-03 17:54:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[30c 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[30d 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30e 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[30f 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[310 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c f7 06 77 ea 1a f2 5b 84 a3 60 7e 60 70 20 ce |\..w...[..`~`p .|
00000010 9f f1 2b eb 89 9f ab cb 4a be d6 bb 4f aa 14 7d |..+.....J...O..}|
[311 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da d8 66 51 d2 cd 9e 58 18 d7 db |0E.!...fQ...X...|
00000010 df fc 96 c3 47 1d 4d 5b dc 16 a8 e4 d6 1c b3 0c |....G.M[........|
00000020 62 16 72 f0 f7 02 20 30 db 28 37 0a 36 55 9b e5 |b.r... 0.(7.6U..|
00000030 54 0d ad ed 43 ad 7a ad d6 4e 1a 06 88 9a 09 b8 |T...C.z..N......|
00000040 82 6a 04 e3 74 b2 ac |.j..t..|
[312 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[313 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 46 b2 44 7c 61 1b f5 9b da 8e |0E.!..F.D|a.....|
00000010 0a 04 5b 29 a1 0d b9 ab 5b 89 77 8d 99 f2 a7 ef |..[)....[.w.....|
00000020 9c 2f fa 8d cc 02 20 25 f5 92 c8 d1 95 2e 0f f5 |./.... %........|
00000030 a8 61 c0 14 a5 4f 68 0b 95 2a c2 4d 32 c6 91 6f |.a...Oh..*.M2..o|
00000040 72 41 86 3d 4b 70 bf |rA.=Kp.|
[314 01-03 17:54:46.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[315 01-03 17:54:46.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[316 01-03 17:54:46.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:9
[317 01-03 17:54:46.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:9
[318 01-03 17:54:46.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[319 01-03 17:54:46.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31a 01-03 17:54:46.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31b 01-03 17:54:46.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57422
[31d 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 214a6827ef80e2378db1dafaba67a9a998507a745160dd5d073932e7db1d362e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[31e 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 214a6827ef80e2378db1dafaba67a9a998507a745160dd5d073932e7db1d362e creator is valid
[31f 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 1e fc 50 da 18 ca a2 4f b8 44 eb b4 b8 9e 9d |...P....O.D.....|
00000010 26 cd 91 28 1b 68 b1 43 0f d9 f0 0b 36 7a 1f ce |&..(.h.C....6z..|
[320 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 a3 8a be 53 dc 64 63 7d 66 bb |0E.!.....S.dc}f.|
00000010 64 b3 15 d2 e4 70 b1 51 28 83 98 8f b6 4f 2a 56 |d....p.Q(....O*V|
00000020 ce cd 4c 24 a3 02 20 4e 76 ff 17 24 60 1f 9f e1 |..L$.. Nv..$`...|
00000030 11 1a 21 b9 38 1a 2a 99 3e 75 fc 7f 63 8d 46 12 |..!.8.*.>u..c.F.|
00000040 07 2f 0b d3 b7 e1 f3 |./.....|
[321 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 214a6827ef80e2378db1dafaba67a9a998507a745160dd5d073932e7db1d362e signature is valid
[322 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU [][214a6827] processing txid: 214a6827ef80e2378db1dafaba67a9a998507a745160dd5d073932e7db1d362e
[323 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU [][214a6827] Entry chaincode: cscc
[324 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> INFO [][214a6827] Entry chaincode: cscc
[325 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU [214a6827] getting chaincode data for cscc on channel
[326 01-03 17:54:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[327 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels
[328 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[329 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[32a 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 1e fc 50 da 18 ca a2 4f b8 44 eb b4 b8 9e 9d |...P....O.D.....|
00000010 26 cd 91 28 1b 68 b1 43 0f d9 f0 0b 36 7a 1f ce |&..(.h.C....6z..|
[32b 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 a3 8a be 53 dc 64 63 7d 66 bb |0E.!.....S.dc}f.|
00000010 64 b3 15 d2 e4 70 b1 51 28 83 98 8f b6 4f 2a 56 |d....p.Q(....O*V|
00000020 ce cd 4c 24 a3 02 20 4e 76 ff 17 24 60 1f 9f e1 |..L$.. Nv..$`...|
00000030 11 1a 21 b9 38 1a 2a 99 3e 75 fc 7f 63 8d 46 12 |..!.8.*.>u..c.F.|
00000040 07 2f 0b d3 b7 e1 f3 |./.....|
[32c 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU [214a6827] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[32d 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU [214a6827] notifying Txid:214a6827ef80e2378db1dafaba67a9a998507a745160dd5d073932e7db1d362e, channelID:
[32e 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[32f 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> INFO [][214a6827] Exit chaincode: cscc (4ms)
[330 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU [][214a6827] Exit
[331 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57422
[332 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57422 grpc.code=OK grpc.call_duration=9.412ms
[333 01-03 17:54:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[334 01-03 17:54:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57430
[335 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU 31514bd228a3b3944fb8a695e3e713c89c1160dc84a996e06e454bac931e6451 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[336 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU 31514bd228a3b3944fb8a695e3e713c89c1160dc84a996e06e454bac931e6451 creator is valid
[337 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 0c c3 04 28 74 a8 90 f8 93 38 cc 35 71 30 bd |4...(t....8.5q0.|
00000010 e5 9f 4f 31 cb 83 7f df e2 7b 56 6f 46 2e 18 10 |..O1.....{VoF...|
[338 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 31 e5 f6 f7 fc 6c c4 cc 18 bb 4a |0D. ?1....l....J|
00000010 b4 17 ce 95 08 fc 48 e0 8c 82 82 67 ce 0b 62 0b |......H....g..b.|
00000020 87 af fc 95 02 20 64 1f cc e2 90 ad 59 3d da af |..... d.....Y=..|
00000030 5a 0a 78 f3 96 46 c1 0a 55 8a ae 3a ca c4 d1 4d |Z.x..F..U..:...M|
00000040 fb 3b 9b 92 7f db |.;....|
[339 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU 31514bd228a3b3944fb8a695e3e713c89c1160dc84a996e06e454bac931e6451 signature is valid
[33a 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][31514bd2] processing txid: 31514bd228a3b3944fb8a695e3e713c89c1160dc84a996e06e454bac931e6451
[33b 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][31514bd2] Entry chaincode: qscc
[33c 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> INFO [][31514bd2] Entry chaincode: qscc
[33d 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU [31514bd2] getting chaincode data for qscc on channel
[33e 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[33f 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel
[340 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo
[341 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[342 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[343 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[344 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[345 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[346 01-03 17:54:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[347 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 0c c3 04 28 74 a8 90 f8 93 38 cc 35 71 30 bd |4...(t....8.5q0.|
00000010 e5 9f 4f 31 cb 83 7f df e2 7b 56 6f 46 2e 18 10 |..O1.....{VoF...|
[348 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 31 e5 f6 f7 fc 6c c4 cc 18 bb 4a |0D. ?1....l....J|
00000010 b4 17 ce 95 08 fc 48 e0 8c 82 82 67 ce 0b 62 0b |......H....g..b.|
00000020 87 af fc 95 02 20 64 1f cc e2 90 ad 59 3d da af |..... d.....Y=..|
00000030 5a 0a 78 f3 96 46 c1 0a 55 8a ae 3a ca c4 d1 4d |Z.x..F..U..:...M|
00000040 fb 3b 9b 92 7f db |.;....|
[349 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[34a 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc4710 gate 1578074087811783300 evaluation starts
[34b 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc4710 signed by 0 principal evaluation starts (used [false])
[34c 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc4710 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[34d 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc4710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[34e 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc4710 principal evaluation fails
[34f 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc4710 gate 1578074087811783300 evaluation fails
[350 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers
[351 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[352 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[353 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 0c c3 04 28 74 a8 90 f8 93 38 cc 35 71 30 bd |4...(t....8.5q0.|
00000010 e5 9f 4f 31 cb 83 7f df e2 7b 56 6f 46 2e 18 10 |..O1.....{VoF...|
[354 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 31 e5 f6 f7 fc 6c c4 cc 18 bb 4a |0D. ?1....l....J|
00000010 b4 17 ce 95 08 fc 48 e0 8c 82 82 67 ce 0b 62 0b |......H....g..b.|
00000020 87 af fc 95 02 20 64 1f cc e2 90 ad 59 3d da af |..... d.....Y=..|
00000030 5a 0a 78 f3 96 46 c1 0a 55 8a ae 3a ca c4 d1 4d |Z.x..F..U..:...M|
00000040 fb 3b 9b 92 7f db |.;....|
[355 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[356 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc58f0 gate 1578074087816624700 evaluation starts
[357 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc58f0 signed by 0 principal evaluation starts (used [false])
[358 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc58f0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[359 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[35a 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[35b 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[35c 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc58f0 principal evaluation succeeds for identity 0
[35d 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc58f0 gate 1578074087816624700 evaluation succeeds
[35e 01-03 17:54:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[35f 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[360 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[361 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[362 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU [31514bd2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[363 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU [31514bd2] notifying Txid:31514bd228a3b3944fb8a695e3e713c89c1160dc84a996e06e454bac931e6451, channelID:
[364 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[365 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> INFO [][31514bd2] Exit chaincode: qscc (19ms)
[366 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU [][31514bd2] Exit
[367 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57430
[368 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57430 grpc.code=OK grpc.call_duration=24.3172ms
[369 01-03 17:54:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[36a 01-03 17:54:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:5773338466076126648 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[36b 01-03 17:54:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5773338466076126648 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[36c 01-03 17:54:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[36d 01-03 17:54:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36e 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[36f 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[370 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[371 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[372 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e bf b1 65 d1 57 d0 a0 a0 aa f0 0a fb c8 b6 4e |...e.W.........N|
00000010 a4 20 02 8b 75 dd fa 4b 3f 0a 51 02 f1 26 fa e2 |. ..u..K?.Q..&..|
[373 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 02 d0 33 3e aa c9 ef 58 8d 53 a1 |0D. /..3>...X.S.|
00000010 3c 65 8d 22 54 c2 0f cb 53 bb e6 0b ca 7c 6a a3 |<e."T...S....|j.|
00000020 93 56 29 0d 02 20 55 c1 82 87 ee 9c 03 10 01 9c |.V).. U.........|
00000030 b4 30 78 76 30 65 3a 3b b3 ae f7 bf 6a 23 8c f1 |.0xv0e:;....j#..|
00000040 d5 e1 37 29 e8 38 |..7).8|
[374 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[375 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 e6 2a ea 43 31 0b 5c a5 b4 dc 51 |0D. b.*.C1.\...Q|
00000010 da 89 55 ab 87 94 84 3a f0 19 7f 0d 8f c1 90 00 |..U....:........|
00000020 d1 b7 7d 0b 02 20 01 0d bf a3 29 55 41 52 98 a7 |..}.. ....)UAR..|
00000030 bd af f0 00 2c a8 06 12 0f b2 46 f6 0e 66 34 08 |....,.....F..f4.|
00000040 06 10 e9 5e 60 e1 |...^`.|
[376 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[377 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[378 01-03 17:54:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:10
[379 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:10
[37a 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[37b 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37c 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37d 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37e 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[37f 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[380 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[381 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[382 01-03 17:54:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[383 01-03 17:54:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315100A
[384 01-03 17:54:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 602EC8395D6E686CCC1D3AB925A09990068F13BFDBE4C740F401E7B442238F40
[385 01-03 17:54:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[386 01-03 17:54:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[387 01-03 17:54:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[388 01-03 17:54:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[389 01-03 17:54:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[38a 01-03 17:54:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38b 01-03 17:54:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[38c 01-03 17:54:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6572971509531716765 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[38d 01-03 17:54:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6572971509531716765 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[38e 01-03 17:54:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38f 01-03 17:54:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6572971509531716765 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes
[390 01-03 17:54:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6572971509531716765 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes
[391 01-03 17:54:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[392 01-03 17:54:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315100B
[393 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2CD0568B79E31F79629E7BC7C600E51BE52746476B174998539B95BBC2C34D0F
[394 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[395 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[396 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:11 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[397 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:11 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[398 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[399 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[39a 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39b 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[39c 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[39d 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c d0 56 8b 79 e3 1f 79 62 9e 7b c7 c6 00 e5 1b |,.V.y..yb.{.....|
00000010 e5 27 46 47 6b 17 49 98 53 9b 95 bb c2 c3 4d 0f |.'FGk.I.S.....M.|
[39e 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 9c 26 36 a0 1b 16 82 d5 d4 36 80 |0D. ..&6......6.|
00000010 c0 87 04 1e aa f2 a5 2b a8 2b b1 8c 4c 3b 05 f4 |.......+.+..L;..|
00000020 02 62 e1 ca 02 20 68 6c da 13 27 54 d3 20 a0 5c |.b... hl..'T. .\|
00000030 fa 33 c1 46 e6 ff a4 e1 8b 8c 28 9d 2c f0 ba 12 |.3.F......(.,...|
00000040 5a d4 fe 5b db 7f |Z..[..|
[39f 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3a0 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 85 3f 05 a6 03 54 2e fd 6c 70 |0E.!...?...T..lp|
00000010 20 64 2d ed 12 e1 d2 e4 44 f4 d9 34 d8 8a e6 a2 | d-.....D..4....|
00000020 4c d9 e1 3e a3 02 20 6c c9 fa 43 9d 71 18 3e f7 |L..>.. l..C.q.>.|
00000030 be d9 c9 03 e7 c0 ba af 4b 91 52 1d 67 7a 8a 4e |........K.R.gz.N|
00000040 8c 62 d9 81 b8 f5 8c |.b.....|
[3a1 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:11 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3a2 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:11 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3a3 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a4 01-03 17:54:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a5 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 1 peers
[3a6 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3a7 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a8 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes
[3a9 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 bf 6f 2e 93 57 33 c6 b9 e6 e8 cc 41 05 80 6c |F.o..W3.....A..l|
00000010 91 b4 20 fa d3 2e ef 6a f7 96 ea 03 28 03 17 ed |.. ....j....(...|
[3aa 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 68 13 b5 21 34 ec 20 4b 57 7f |0E.!..h..!4. KW.|
00000010 6b 84 fa 43 d2 c8 93 ab a2 cb 9b b4 10 ba 4a 87 |k..C..........J.|
00000020 8a 7b fd 02 63 02 20 19 87 27 ce 28 c9 a4 15 38 |.{..c. ..'.(...8|
00000030 53 14 d8 38 d0 97 fc cd 98 5c 76 ea 33 93 38 13 |S..8.....\v.3.8.|
00000040 a2 73 12 8e 34 69 39 |.s..4i9|
[3ab 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3ac 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3ad 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ae 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3af 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3b0 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b1 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[3b2 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 bf 6f 2e 93 57 33 c6 b9 e6 e8 cc 41 05 80 6c |F.o..W3.....A..l|
00000010 91 b4 20 fa d3 2e ef 6a f7 96 ea 03 28 03 17 ed |.. ....j....(...|
[3b3 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 68 13 b5 21 34 ec 20 4b 57 7f |0E.!..h..!4. KW.|
00000010 6b 84 fa 43 d2 c8 93 ab a2 cb 9b b4 10 ba 4a 87 |k..C..........J.|
00000020 8a 7b fd 02 63 02 20 19 87 27 ce 28 c9 a4 15 38 |.{..c. ..'.(...8|
00000030 53 14 d8 38 d0 97 fc cd 98 5c 76 ea 33 93 38 13 |S..8.....\v.3.8.|
00000040 a2 73 12 8e 34 69 39 |.s..4i9|
[3b4 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b5 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d288f0 gate 1578074089519278000 evaluation starts
[3b6 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d288f0 signed by 0 principal evaluation starts (used [false])
[3b7 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d288f0 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[3b8 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d288f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[3b9 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d288f0 principal evaluation fails
[3ba 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d288f0 gate 1578074089519278000 evaluation fails
[3bb 01-03 17:54:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers
[3bc 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3bd 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3be 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 bf 6f 2e 93 57 33 c6 b9 e6 e8 cc 41 05 80 6c |F.o..W3.....A..l|
00000010 91 b4 20 fa d3 2e ef 6a f7 96 ea 03 28 03 17 ed |.. ....j....(...|
[3bf 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 68 13 b5 21 34 ec 20 4b 57 7f |0E.!..h..!4. KW.|
00000010 6b 84 fa 43 d2 c8 93 ab a2 cb 9b b4 10 ba 4a 87 |k..C..........J.|
00000020 8a 7b fd 02 63 02 20 19 87 27 ce 28 c9 a4 15 38 |.{..c. ..'.(...8|
00000030 53 14 d8 38 d0 97 fc cd 98 5c 76 ea 33 93 38 13 |S..8.....\v.3.8.|
00000040 a2 73 12 8e 34 69 39 |.s..4i9|
[3c0 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3c1 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d29ad0 gate 1578074089520731800 evaluation starts
[3c2 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d29ad0 signed by 0 principal evaluation starts (used [false])
[3c3 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d29ad0 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[3c4 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[3c5 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[3c6 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[3c7 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d29ad0 principal evaluation succeeds for identity 0
[3c8 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d29ad0 gate 1578074089520731800 evaluation succeeds
[3c9 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[3ca 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3cb 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3cc 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3cd 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ce 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074085553142200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes to 1 peers
[3cf 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074085553142200 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes
[3d0 01-03 17:54:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d1 01-03 17:54:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[3d2 01-03 17:54:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d3 01-03 17:54:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6077424165251634192 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3d4 01-03 17:54:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6077424165251634192 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3d5 01-03 17:54:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d6 01-03 17:54:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57746 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074085790949600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes
[3d7 01-03 17:54:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 bf 6f 2e 93 57 33 c6 b9 e6 e8 cc 41 05 80 6c |F.o..W3.....A..l|
00000010 91 b4 20 fa d3 2e ef 6a f7 96 ea 03 28 03 17 ed |.. ....j....(...|
[3d8 01-03 17:54:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 68 13 b5 21 34 ec 20 4b 57 7f |0E.!..h..!4. KW.|
00000010 6b 84 fa 43 d2 c8 93 ab a2 cb 9b b4 10 ba 4a 87 |k..C..........J.|
00000020 8a 7b fd 02 63 02 20 19 87 27 ce 28 c9 a4 15 38 |.{..c. ..'.(...8|
00000030 53 14 d8 38 d0 97 fc cd 98 5c 76 ea 33 93 38 13 |S..8.....\v.3.8.|
00000040 a2 73 12 8e 34 69 39 |.s..4i9|
[3d9 01-03 17:54:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3da 01-03 17:54:50.51 UTC] [%{longpkg}] %{callpath} -> INFO [[businesschannel] Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]]
[3db 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[3dc 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> INFO c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader
[3dd 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel
[3de 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel
[3df 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[3e0 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[3e1 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510021801
[3e2 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1AA865FC51A63279FB091CEE827632C53EAE95BB921012CB3B6E86FDC505B8C1
[3e3 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[3e4 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0AEF060A1B08051A0608EBFFBDF00522...01120D1A0B08FFFFFFFFFFFFFFFFFF01
[3e5 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CF0D2A7349D0FAFC8E1B9D0914F31F68C609E3BF0A681374C74148CAD515F282
[3e6 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[3e7 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[3e8 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e9 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[3ea 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[3eb 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{orderer2.example.com:7050 0 <nil>}] <nil>}
[3ec 01-03 17:54:51.52 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[3ed 01-03 17:54:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002d13260, CONNECTING
[3ee 01-03 17:54:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002d13260, READY
[3ef 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3f0 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[3f1 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[3f2 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3f3 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[3f4 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f5 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[3f6 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 86 e5 78 dd 4a 26 ec fb c1 be 38 62 be ce 83 |e..x.J&....8b...|
00000010 f5 21 78 e6 c1 ba f7 5a 19 ac d9 83 d5 f5 9b 29 |.!x....Z.......)|
[3f7 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 d6 6b 4a 75 15 83 22 0d 5e 02 |0E.!...kJu..".^.|
00000010 68 8c 34 44 5f a1 b4 88 e5 3c 7f bc 12 16 f0 e4 |h.4D_....<......|
00000020 87 aa 4f 24 7c 02 20 21 2e e1 95 c8 71 ce 85 36 |..O$|. !....q..6|
00000030 36 fa fe f9 83 22 ef d8 64 d2 25 4e e9 74 93 60 |6...."..d.%N.t.`|
00000040 a1 58 d0 82 73 e3 82 |.X..s..|
[3f8 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f9 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13fb0 gate 1578074091542870900 evaluation starts
[3fa 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13fb0 signed by 0 principal evaluation starts (used [false])
[3fb 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13fb0 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[3fc 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP
[3fd 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[3fe 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13fb0 principal evaluation succeeds for identity 0
[3ff 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13fb0 gate 1578074091542870900 evaluation succeeds
[400 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[401 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[402 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[403 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[404 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [1] channel=businesschannel
[405 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1]
[406 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[407 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [1] channel=businesschannel
[408 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23690 bytes, seq: 1}, Envelope: 23723 bytes, Signature: 0 bytes to the block puller
[409 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1
[40a 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[40b 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[40c 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[40d 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[40e 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[40f 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c8 22 97 82 68 2c fc d7 17 d2 bd ad ec 64 1e |.."..h,.......d.|
00000010 c5 fe 7e 84 e2 79 76 c8 4f e8 96 f5 05 2b f9 96 |..~..yv.O....+..|
[410 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 62 47 a0 c9 64 9a 93 1e f3 2c 1c |0D. .bG..d....,.|
00000010 74 4e f7 09 8c 4b ae 15 12 e6 11 30 05 67 1f 0a |tN...K.....0.g..|
00000020 29 49 b9 03 02 20 57 15 5a f0 f0 9a ae 41 4c 5b |)I... W.Z....AL[|
00000030 ae 97 48 39 03 e8 e6 25 e7 c5 dd 84 13 03 47 fe |..H9...%......G.|
00000040 15 49 0a 7d 7e df |.I.}~.|
[411 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[412 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11c70 gate 1578074091544395400 evaluation starts
[413 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11c70 signed by 0 principal evaluation starts (used [false])
[414 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11c70 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[415 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11c70 principal evaluation succeeds for identity 0
[416 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11c70 gate 1578074091544395400 evaluation succeeds
[417 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[418 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[419 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[41a 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[41b 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [2] channel=businesschannel
[41c 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2]
[41d 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 2 blocks
[41e 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [2] channel=businesschannel
[41f 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23746 bytes, seq: 2}, Envelope: 23779 bytes, Signature: 0 bytes to the block puller
[420 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2
[421 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]
[422 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger
[423 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer
[424 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1]
[425 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1]
[426 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[427 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002c83080 env 0xc002e02b40 txn 0
[428 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002e02b40
[429 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\350\377\275\360\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\001YGpIG\216o2\367\374MY\3344$\311,G \302[\000\337"
[42a 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1
[42b 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[42c 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[42d 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42e 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV
BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG
CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN
4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH
gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U
4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6
N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh
QQ==
-----END CERTIFICATE-----
[42f 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}
[430 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[432 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[431 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23690 bytes, seq: 1}, Envelope: 23723 bytes, Signature: 0 bytes to 1 peers
[433 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23746 bytes, seq: 2}, Envelope: 23779 bytes, Signature: 0 bytes to 1 peers
[434 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23746 bytes, seq: 2}, Envelope: 23779 bytes, Signature: 0 bytes
[435 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[436 01-03 17:54:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 34 68 08 dd 9a 0e f1 cb 16 80 45 c1 0f fc 9d |.4h........E....|
00000010 fb b5 fa 11 89 78 c3 6e fc 8c 11 42 d6 a7 40 b4 |.....x.n...B..@.|
[437 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 7a dd d3 60 aa 3c 6f b5 49 18 |0E.!..z..`.<o.I.|
00000010 e6 a2 53 73 c9 4a 45 b5 74 0b af 31 4d 28 33 93 |..Ss.JE.t..1M(3.|
00000020 40 1e 71 5a a5 02 20 14 12 42 1b 4d 37 cd 11 e5 |@.qZ.. ..B.M7...|
00000030 02 f7 77 26 07 8c b3 95 14 8e 85 d4 a3 a7 61 3c |..w&..........a<|
00000040 62 ba 80 0e d6 b2 cb |b......|
[438 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[439 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc002df7500, header channel_header:"\010\001\032\006\010\350\377\275\360\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\001YGpIG\216o2\367\374MY\3344$\311,G \302[\000\337"
[43a 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[43b 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[43c 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[43d 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[43e 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[43f 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[440 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[441 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[442 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[443 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[444 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[445 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[446 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers
[447 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[448 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[449 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[44a 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[44b 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[44c 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP
[44d 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins
[44e 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[44f 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[450 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[451 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[452 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[453 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[454 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP]
[455 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[456 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[457 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path []
[458 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==
[459 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c 11 9b 43 49 2b dc 5e ae d1 ee b7 fa ca a0 33 |...CI+.^.......3|
00000010 d0 34 16 50 b9 2c c5 71 3e df 3c d3 af b4 f4 2e |.4.P.,.q>.<.....|
[45a 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 35 d1 ab c2 84 7b 0e 56 67 76 |0E.!..5....{.Vgv|
00000010 e8 1f 5c 30 f7 7b de f2 e7 6d bf 3e 24 8d d3 67 |..\0.{...m.>$..g|
00000020 25 0c ad 8e 27 02 20 3a ac 90 f9 f5 2d 7e cc c1 |%...'. :....-~..|
00000030 e1 64 d0 0e 5e 16 2f ed 75 48 3d b3 74 be 79 70 |.d..^./.uH=.t.yp|
00000040 92 80 19 38 b0 34 d1 |...8.4.|
[45b 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23690 bytes, seq: 1}, Envelope: 23723 bytes, Signature: 0 bytes
[45c 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45d 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[45e 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e91eb0 gate 1578074091553493400 evaluation starts
[45f 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e91eb0 signed by 0 principal evaluation starts (used [false])
[460 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e91eb0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[461 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP
[462 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e91eb0 principal evaluation succeeds for identity 0
[463 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e91eb0 gate 1578074091553493400 evaluation succeeds
[464 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins
[465 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins
[466 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers
[467 01-03 17:54:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins"
[468 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[469 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[46a 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[46b 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[46c 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[46d 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[46e 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to
[46f 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to
[470 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to
[471 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to
[472 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[473 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[474 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[475 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins"
[476 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[477 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[478 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins"
[479 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins"
[47a 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[47b 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[47c 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[47d 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[47e 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[47f 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[480 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[481 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[482 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[483 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[484 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[485 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[486 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[487 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[488 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[489 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[48a 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[48b 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[48c 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[48d 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[48e 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[48f 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[490 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[491 01-03 17:54:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[492 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[493 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[494 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
[495 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[496 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[497 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[498 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[499 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[49a 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[49b 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[49c 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[49d 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 >
[49e 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[49f 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[4a0 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[4a1 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[4a2 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[4a3 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[4a4 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[4a5 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[4a6 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[4a7 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[4a8 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[4a9 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[4aa 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[4ab 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are
[4ac 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[4ad 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[4ae 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[4af 01-03 17:54:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[4b0 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[4b1 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[4b2 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[4b3 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[4b4 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[4b5 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps)
[4b6 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps
[4b7 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg
[4b8 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg
[4b9 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg
[4ba 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer
[4bb 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer
[4bc 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer
[4bd 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer
[4be 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP
[4bf 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP
[4c0 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP
[4c1 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP
[4c2 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP
[4c3 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP
[4c4 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP
[4c5 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP
[4c6 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application
[4c7 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application
[4c8 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application
[4c9 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application
[4ca 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application
[4cb 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel
[4cc 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel
[4cd 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel
[4ce 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[4cf 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer
[4d0 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg
[4d1 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP
[4d2 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers
[4d3 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers
[4d4 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins
[4d5 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities
[4d6 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType
[4d7 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize
[4d8 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout
[4d9 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions
[4da 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation
[4db 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers
[4dc 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers
[4dd 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins
[4de 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[4df 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[4e0 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers
[4e1 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[4e2 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[4e3 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[4e4 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[4e5 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[4e6 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[4e7 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[4e8 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[4e9 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[4ea 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[4eb 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[4ec 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[4ed 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[4ee 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[4ef 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[4f0 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[4f1 01-03 17:54:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[4f2 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[4f3 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium
[4f4 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure
[4f5 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses
[4f6 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities
[4f7 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm
[4f8 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers
[4f9 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers
[4fa 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins
[4fb 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers'
[4fc 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers'
[4fd 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[4fe 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[4ff 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[500 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[501 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[502 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[503 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers'
[504 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers'
[505 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins'
[506 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer]
[507 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[508 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[509 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path []
[50a 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg
[50b 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation'
[50c 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins'
[50d 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers'
[50e 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers'
[50f 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[510 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[511 01-03 17:54:51.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing updates for orderer endpoints channel=businesschannel
[512 01-03 17:54:51.60 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:53.605Z grpc.peer_address=172.18.0.5:57794 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=261.2µs
[513 01-03 17:54:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU No orderer endpoint addresses or TLS certs were changed channel=businesschannel
[514 01-03 17:54:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel
[515 01-03 17:54:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel
[516 01-03 17:54:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]
[517 01-03 17:54:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: []
[518 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[519 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[51a 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[51c 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[51d 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[51e 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[51f 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 bf 6f 2e 93 57 33 c6 b9 e6 e8 cc 41 05 80 6c |F.o..W3.....A..l|
00000010 91 b4 20 fa d3 2e ef 6a f7 96 ea 03 28 03 17 ed |.. ....j....(...|
[520 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 68 13 b5 21 34 ec 20 4b 57 7f |0E.!..h..!4. KW.|
00000010 6b 84 fa 43 d2 c8 93 ab a2 cb 9b b4 10 ba 4a 87 |k..C..........J.|
00000020 8a 7b fd 02 63 02 20 19 87 27 ce 28 c9 a4 15 38 |.{..c. ..'.(...8|
00000030 53 14 d8 38 d0 97 fc cd 98 5c 76 ea 33 93 38 13 |S..8.....\v.3.8.|
00000040 a2 73 12 8e 34 69 39 |.s..4i9|
[51b 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[521 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[523 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc8910 gate 1578074091613112800 evaluation starts
[522 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[524 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc8910 signed by 0 principal evaluation starts (used [false])
[526 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc8910 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[527 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc8910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[528 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc8910 principal evaluation fails
[525 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:57794
[529 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc8910 gate 1578074091613112800 evaluation fails
[52a 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers
[52b 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[52d 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[52e 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 bf 6f 2e 93 57 33 c6 b9 e6 e8 cc 41 05 80 6c |F.o..W3.....A..l|
00000010 91 b4 20 fa d3 2e ef 6a f7 96 ea 03 28 03 17 ed |.. ....j....(...|
[52f 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 68 13 b5 21 34 ec 20 4b 57 7f |0E.!..h..!4. KW.|
00000010 6b 84 fa 43 d2 c8 93 ab a2 cb 9b b4 10 ba 4a 87 |k..C..........J.|
00000020 8a 7b fd 02 63 02 20 19 87 27 ce 28 c9 a4 15 38 |.{..c. ..'.(...8|
00000030 53 14 d8 38 d0 97 fc cd 98 5c 76 ea 33 93 38 13 |S..8.....\v.3.8.|
00000040 a2 73 12 8e 34 69 39 |.s..4i9|
[530 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[52c 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:57794
[531 01-03 17:54:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|
[532 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 1a ec 04 fc 46 bd e2 7f c3 54 0b |0D. E....F....T.|
00000010 dc fb 2a 2a 62 61 7b 00 ae 97 40 fc fe 53 42 22 |..**ba{...@..SB"|
00000020 46 b1 70 22 02 20 56 4d 92 30 45 98 77 83 b9 bb |F.p". VM.0E.w...|
00000030 a5 3a 5c 6f 6b 54 97 4c 91 d3 60 64 5d 03 5b 57 |.:\okT.L..`d].[W|
00000040 8d 97 08 76 18 e1 |...v..|
[533 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:57794
[534 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:57794
[535 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[536 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[537 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:57746 disconnected
[538 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:57746 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.6523787s
[539 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[53a 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[53b 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[53c 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:57794 disconnected
[53d 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:55:01.61Z grpc.peer_address=172.18.0.5:57794 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=15.4847ms
[53e 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92c0 gate 1578074091619171200 evaluation starts
[53f 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92c0 signed by 0 principal evaluation starts (used [false])
[540 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92c0 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[541 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92c0 principal evaluation succeeds for identity 0
[543 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92c0 gate 1578074091619171200 evaluation succeeds
[542 01-03 17:54:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[544 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[545 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[546 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[547 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[548 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations
[549 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]
[54a 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself
[54b 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about
[54c 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel
[54d 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP]
[54e 01-03 17:54:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP]
[54f 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel
[550 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002c83080 env 0xc002e02b40 txn 0
[551 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[552 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 98ms
[553 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> WARN Invalid transaction type: header type is not an endorser transaction
[554 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[555 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[556 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [1] channel=businesschannel
[557 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1]
[558 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[559 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[55a 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[55b 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1]
[55c 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[55d 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG
[55e 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG]
[55f 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.ConfigTxProcessor{}
[560 01-03 17:54:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[561 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = []
[562 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG
[563 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[564 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[565 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]
[566 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"CHANNEL_CONFIG_ENV_BYTES"}:(*internal.keyOps)(0xc002fc6cc0)}
[567 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[568 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[569 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[56a 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1]
[56b 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage
[56c 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store
[56d 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1]
[56e 01-03 17:54:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1]
[56f 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x95, 0xc2, 0x7d, 0xa0, 0xbd, 0xba, 0x2d, 0x7d, 0x4b, 0x24, 0xe, 0x76, 0xa9, 0xd, 0x87, 0x16, 0xc8, 0x61, 0xab, 0x37, 0x27, 0x41, 0xfd, 0x94, 0x10, 0xe0, 0xa9, 0x40, 0x52, 0xb6, 0xda, 0x50} txOffsets=
txId=8261c66aa3ce389d82271231ae1ec6c31464f04d11def3758b7c3d332fd3c936 locPointer=offset=71, bytesLength=22679
]
[570 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=24013, bytesLength=22679] for tx ID: [8261c66aa3ce389d82271231ae1ec6c31464f04d11def3758b7c3d332fd3c936] to txid-index
[571 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=24013, bytesLength=22679] for tx number:[0] ID: [8261c66aa3ce389d82271231ae1ec6c31464f04d11def3758b7c3d332fd3c936] to blockNumTranNum index
[572 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47654], isChainEmpty=[false], lastBlockNumber=[1]
[573 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database
[574 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[575 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[576 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[577 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[578 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dCHANNEL_CONFIG_ENV_BYTES] key(bytes)=[[]byte{0x64, 0x0, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x45, 0x4e, 0x56, 0x5f, 0x42, 0x59, 0x54, 0x45, 0x53}]
[579 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[57a 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2]
[57b 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[57d 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database
[57e 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions
[57f 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction
[57c 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]
[580 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2]
[581 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1]
[582 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 22ms (state_validation=9ms block_and_pvtdata_commit=8ms state_commit=3ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]
[583 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408908FF491D1C09CF315...624D0F542C442AB5FE8C65C22A020802
[584 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EFE6BC2853FD3E841F865C095C2C105655ABAFA9732370973D2B33F580CEC1BE
[585 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s)
[586 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger
[587 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer
[588 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2]
[589 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2]
[58a 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[58b 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002f6a740 env 0xc002f86910 txn 0
[58c 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002f86910
[58d 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\352\377\275\360\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\305\314\321\326u\027\026A\213\321\222\253\267\347-\204\261\230\233\366\2470C\326"
[58e 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1
[58f 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[590 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[591 01-03 17:54:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[592 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[593 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}
[594 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[595 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[596 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 b9 a4 41 bf b1 d0 b3 dc 2f ce d9 f2 cf 21 45 |...A...../....!E|
00000010 59 d4 8f ce 4c a5 f1 6a 54 d0 51 01 c7 21 aa f8 |Y...L..jT.Q..!..|
[597 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 0d 34 0a f9 20 f7 69 3a aa c9 94 |0D. ^.4.. .i:...|
00000010 0a e8 f6 de 2f 39 97 1b 65 37 0d 5b 26 59 06 18 |..../9..e7.[&Y..|
00000020 e9 23 36 75 02 20 67 67 b2 07 2a 29 59 91 78 33 |.#6u. gg..*)Y.x3|
00000030 ef 6f 3f 73 8d 7e 99 d1 e2 b9 5a 7e 5a 0f d2 2a |.o?s.~....Z~Z..*|
00000040 20 3b 0c b8 c9 d7 | ;....|
[598 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[599 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00309a000, header channel_header:"\010\001\032\006\010\352\377\275\360\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\305\314\321\326u\027\026A\213\321\222\253\267\347-\204\261\230\233\366\2470C\326"
[59a 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[59b 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[59c 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[59d 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[59e 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[59f 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[5a0 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[5a1 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[5a2 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[5a3 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[5a4 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[5a5 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[5a6 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers
[5a7 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[5a8 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[5a9 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[5aa 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[5ab 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[5ac 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP
[5ad 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins
[5ae 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[5af 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[5b0 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[5b1 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[5b2 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[5b3 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[5b4 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP]
[5b5 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[5b6 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[5b7 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path []
[5b8 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==
[5b9 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ba 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[5bb 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 58 f6 83 4e 85 6c f0 bb 79 d2 57 2a 17 97 5e |.X..N.l..y.W*..^|
00000010 85 3d 45 06 01 63 82 ae e6 c2 ec 15 d8 b9 eb c6 |.=E..c..........|
[5bc 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 70 a7 23 78 98 18 fe bf 71 81 |0E.!..p.#x....q.|
00000010 0c 09 80 7f 38 17 2f b9 d1 f5 ae 22 d8 59 e2 eb |....8./....".Y..|
00000020 ab d9 e0 94 bd 02 20 7c 76 8c 9b f6 fc fa f3 16 |...... |v.......|
00000030 0a 6d a6 16 53 31 f3 fc 0d c5 d2 54 57 94 33 0d |.m..S1.....TW.3.|
00000040 8b e9 07 81 4f b0 76 |....O.v|
[5bd 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5be 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5440 gate 1578074091673394200 evaluation starts
[5bf 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5440 signed by 0 principal evaluation starts (used [false])
[5c0 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5440 processing identity 0 - &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[5c1 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP
[5c2 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5440 principal evaluation succeeds for identity 0
[5c3 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5440 gate 1578074091673394200 evaluation succeeds
[5c4 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins
[5c5 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins
[5c6 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers
[5c7 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[5c8 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[5c9 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins"
[5ca 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[5cb 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[5cc 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[5cd 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[5ce 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to
[5cf 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to
[5d0 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to
[5d1 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to
[5d2 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[5d3 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins"
[5d4 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[5d5 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[5d6 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins"
[5d7 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[5d8 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[5d9 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[5da 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins"
[5db 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[5dc 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[5dd 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[5de 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[5df 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[5e0 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[5e1 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[5e2 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[5e3 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[5e4 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[5e5 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[5e6 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[5e7 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[5e8 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[5e9 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[5ea 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[5eb 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 >
[5ec 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[5ed 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[5ee 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[5ef 01-03 17:54:51.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[5f0 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE
AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y
aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw
RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2
N0qzbu085qQXfAXf7yy4VoSHr1A6
-----END CERTIFICATE-----
[5f1 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[5f2 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[5f3 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[5f4 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[5f5 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[5f6 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[5f7 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[5f8 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[5f9 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 >
[5fa 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[5fb 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[5fc 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[5fd 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[5fe 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[5ff 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[600 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[601 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[602 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[603 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[604 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[605 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[606 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[607 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[608 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[609 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[60a 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[60b 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[60c 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[60d 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[60e 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[60f 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[610 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[611 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[612 01-03 17:54:51.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[613 01-03 17:54:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
[614 01-03 17:54:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[615 01-03 17:54:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps)
[616 01-03 17:54:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps
[617 01-03 17:54:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP
[618 01-03 17:54:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP
[619 01-03 17:54:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP
[61a 01-03 17:54:51.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP
[61b 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP
[61c 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP
[61d 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP
[61e 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP
[61f 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application
[620 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application
[621 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application
[622 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application
[623 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application
[624 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg
[625 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg
[626 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg
[627 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer
[628 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer
[629 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer
[62a 01-03 17:54:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer
[62b 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel
[62c 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel
[62d 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel
[62e 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[62f 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[630 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[631 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers
[632 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[633 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[634 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[635 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[636 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[637 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[638 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers
[639 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[63a 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[63b 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[63c 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[63d 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[63e 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[63f 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[640 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:53.717Z grpc.peer_address=172.18.0.5:57796 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=160.2µs
[641 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[642 01-03 17:54:51.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[643 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[644 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[645 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[646 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer
[647 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg
[648 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP
[649 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers
[64a 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers
[64b 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins
[64c 01-03 17:54:51.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[64e 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[64d 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities
[64f 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType
[650 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize
[651 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout
[652 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions
[653 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins
[654 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation
[655 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers
[656 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers
[657 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium
[658 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure
[659 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses
[65a 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities
[65b 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm
[65c 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers
[65d 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins
[65e 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers
[65f 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers'
[660 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers'
[661 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[662 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[663 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[664 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[665 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[666 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[667 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers'
[668 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers'
[669 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins'
[66a 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer]
[66b 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[66c 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[66d 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path []
[66e 01-03 17:54:51.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg
[66f 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation'
[670 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins'
[671 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers'
[672 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers'
[673 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[674 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[675 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing updates for orderer endpoints channel=businesschannel
[676 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU No orderer endpoint addresses or TLS certs were changed channel=businesschannel
[677 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel
[678 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel
[679 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]
[67a 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]
[67b 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[67c 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[67d 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[67e 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[67f 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[680 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[681 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[682 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[683 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 bf 6f 2e 93 57 33 c6 b9 e6 e8 cc 41 05 80 6c |F.o..W3.....A..l|
00000010 91 b4 20 fa d3 2e ef 6a f7 96 ea 03 28 03 17 ed |.. ....j....(...|
[684 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 68 13 b5 21 34 ec 20 4b 57 7f |0E.!..h..!4. KW.|
00000010 6b 84 fa 43 d2 c8 93 ab a2 cb 9b b4 10 ba 4a 87 |k..C..........J.|
00000020 8a 7b fd 02 63 02 20 19 87 27 ce 28 c9 a4 15 38 |.{..c. ..'.(...8|
00000030 53 14 d8 38 d0 97 fc cd 98 5c 76 ea 33 93 38 13 |S..8.....\v.3.8.|
00000040 a2 73 12 8e 34 69 39 |.s..4i9|
[685 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[686 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c9880 gate 1578074091741366500 evaluation starts
[687 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c9880 signed by 0 principal evaluation starts (used [false])
[688 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c9880 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[689 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[68a 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[68b 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[68c 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c9880 principal evaluation succeeds for identity 0
[68d 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c9880 gate 1578074091741366500 evaluation succeeds
[68e 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[68f 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[690 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[691 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[692 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations
[693 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]
[694 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself
[695 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]
[696 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: <nil>, Metadata:
[697 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[698 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel
[699 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP]
[69a 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP]
[69b 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel
[69c 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002f6a740 env 0xc002f86910 txn 0
[69d 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[69e 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 73ms
[69f 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> WARN Invalid transaction type: header type is not an endorser transaction
[6a0 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[6a1 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[6a2 01-03 17:54:51.74 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [2] channel=businesschannel
[6a3 01-03 17:54:51.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:57796
[6a5 01-03 17:54:51.75 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:57796
[6a6 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|
[6a7 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 93 60 0b 24 47 6c 1e a8 71 0c |0E.!...`.$Gl..q.|
00000010 ae 8d d5 2d 21 1f 4e 0a e7 6b b7 5c 04 b0 2c 82 |...-!.N..k.\..,.|
00000020 6c 5a 03 ac 79 02 20 5d ad 6d 53 9f 8c cd 9d ac |lZ..y. ].mS.....|
00000030 52 33 50 81 30 d0 a4 0f b6 06 06 7b 5c 67 42 e9 |R3P.0......{\gB.|
00000040 00 ad fb 7e 5b f6 ba |...~[..|
[6a8 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:57796
[6a9 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:57796
[6a4 01-03 17:54:51.75 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[6aa 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[6ab 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] <nil>}
[6ac 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[6ad 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00323d9e0, CONNECTING
[6ae 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2]
[6af 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[6b0 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[6b1 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[6b2 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2]
[6b3 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[6b4 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG
[6b5 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG]
[6b6 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.ConfigTxProcessor{}
[6b7 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[6b8 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = []
[6b9 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG
[6ba 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[6bb 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[6bc 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]
[6bd 01-03 17:54:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"CHANNEL_CONFIG_ENV_BYTES"}:(*internal.keyOps)(0xc002fc7a00)}
[6be 01-03 17:54:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[6bf 01-03 17:54:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[6c0 01-03 17:54:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[6c1 01-03 17:54:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2]
[6c2 01-03 17:54:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage
[6c3 01-03 17:54:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store
[6c4 01-03 17:54:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2]
[6c5 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2]
[6c6 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xf6, 0xe9, 0x79, 0x67, 0xa2, 0x3f, 0x96, 0x3c, 0x3f, 0x32, 0x96, 0xc5, 0x4a, 0xcf, 0x92, 0x5b, 0x98, 0x93, 0xcd, 0x45, 0x15, 0x1b, 0x7, 0x8e, 0x2e, 0x7d, 0xac, 0x15, 0x59, 0xb4, 0xe3, 0xe6} txOffsets=
txId=f3d6cd8a143b9a18091c7ad9c6bd178fb24f1efe2fc97e8de7ac84772a907a35 locPointer=offset=71, bytesLength=22736
]
[6c7 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=47725, bytesLength=22736] for tx ID: [f3d6cd8a143b9a18091c7ad9c6bd178fb24f1efe2fc97e8de7ac84772a907a35] to txid-index
[6c8 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=47725, bytesLength=22736] for tx number:[0] ID: [f3d6cd8a143b9a18091c7ad9c6bd178fb24f1efe2fc97e8de7ac84772a907a35] to blockNumTranNum index
[6c9 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71422], isChainEmpty=[false], lastBlockNumber=[2]
[6ca 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database
[6cb 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[6cc 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[6cd 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[6ce 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[6cf 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dCHANNEL_CONFIG_ENV_BYTES] key(bytes)=[[]byte{0x64, 0x0, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x45, 0x4e, 0x56, 0x5f, 0x42, 0x59, 0x54, 0x45, 0x53}]
[6d0 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[6d1 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3]
[6d2 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]
[6d3 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3]
[6d4 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[6d5 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database
[6d6 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions
[6d7 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction
[6d8 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2]
[6d9 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 25ms (state_validation=7ms block_and_pvtdata_commit=13ms state_commit=2ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]
[6da 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408908FF491D1C09CF315...624D0F542C442AB5FE8C65C22A020803
[6db 01-03 17:54:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 223A6FE47A3AFC1FB35C2A8A696BD223BA0DFD59A7E9A415D1C11DBED14F92FE
[6dc 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s)
[6dd 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[6de 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:57796 disconnected
[6df 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:55:01.726Z grpc.peer_address=172.18.0.5:57796 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=65.1988ms
[6e0 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[6e1 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00323d9e0, READY
[6e2 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6e3 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6e4 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[6e5 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[6e6 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051
[6e7 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051
[6e8 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e9 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ea 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[6eb 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[6ec 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[6ed 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6ee 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ef 01-03 17:54:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6f0 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f1 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f2 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6f3 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6f4 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6f5 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6f6 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6f7 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6f8 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[6f9 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 e1 00 cb 2d 60 b1 5c 71 72 61 |0E.!.....-`.\qra|
00000010 d6 8d 56 bf da 7c a1 10 08 b7 5d 3e 7c 8f d7 ea |..V..|....]>|...|
00000020 95 c7 af 5a 68 02 20 65 9c 5a ec f8 a1 12 19 0e |...Zh. e.Z......|
00000030 70 d4 b8 ec ec 10 24 70 15 25 2e 91 6a 2e bf 20 |p.....$p.%..j.. |
00000040 33 1c 4a 3f 3d be 55 |3.J?=.U|
[6fa 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fb 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033323b0 gate 1578074091800871300 evaluation starts
[6fc 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033323b0 signed by 0 principal evaluation starts (used [false])
[6fd 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033323b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6fe 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033323b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6ff 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033323b0 principal evaluation fails
[700 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033323b0 gate 1578074091800871300 evaluation fails
[701 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[702 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[703 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[704 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[705 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 e1 00 cb 2d 60 b1 5c 71 72 61 |0E.!.....-`.\qra|
00000010 d6 8d 56 bf da 7c a1 10 08 b7 5d 3e 7c 8f d7 ea |..V..|....]>|...|
00000020 95 c7 af 5a 68 02 20 65 9c 5a ec f8 a1 12 19 0e |...Zh. e.Z......|
00000030 70 d4 b8 ec ec 10 24 70 15 25 2e 91 6a 2e bf 20 |p.....$p.%..j.. |
00000040 33 1c 4a 3f 3d be 55 |3.J?=.U|
[706 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[707 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003332cd0 gate 1578074091802454300 evaluation starts
[708 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003332cd0 signed by 0 principal evaluation starts (used [false])
[709 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003332cd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[70a 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[70b 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[70c 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003332cd0 principal evaluation succeeds for identity 0
[70d 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003332cd0 gate 1578074091802454300 evaluation succeeds
[70e 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[70f 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[710 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[711 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[712 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051
[713 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[714 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151011
[715 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 63B47D682E4D5487387508BCDC867E915EC714555658B4102E6C51145E65968F
[716 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[717 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[718 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[719 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11379403011736507807, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes to 1 peers
[71a 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11379403011736507807, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[71b 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[71c 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[71d 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[71e 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] <nil>}
[71f 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[720 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00335f810, CONNECTING
[721 01-03 17:54:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[722 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00335f810, READY
[723 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[724 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[725 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051
[726 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051
[727 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[728 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[729 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72a 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[72b 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72c 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[72d 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[72e 01-03 17:54:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[72f 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[730 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[731 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[732 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[733 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 2b 9e 4b a5 c6 62 05 8d 21 c9 13 |0D. U+.K..b..!..|
00000010 06 78 64 17 2d 61 23 65 ae 79 7f 3e 3d cd 91 c6 |.xd.-a#e.y.>=...|
00000020 fb 2c 5b b8 02 20 7b 95 e6 c8 51 9f c0 25 1e bf |.,[.. {...Q..%..|
00000030 c2 69 b4 43 e3 a1 f5 21 7c ee 8f 95 72 43 72 a9 |.i.C...!|...rCr.|
00000040 88 95 2b 27 af 12 |..+'..|
[734 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[735 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b39e0 gate 1578074091830400700 evaluation starts
[736 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b39e0 signed by 0 principal evaluation starts (used [false])
[737 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b39e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[738 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b39e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[739 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b39e0 principal evaluation fails
[73a 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b39e0 gate 1578074091830400700 evaluation fails
[73b 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[73c 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[73d 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[73e 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[73f 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 2b 9e 4b a5 c6 62 05 8d 21 c9 13 |0D. U+.K..b..!..|
00000010 06 78 64 17 2d 61 23 65 ae 79 7f 3e 3d cd 91 c6 |.xd.-a#e.y.>=...|
00000020 fb 2c 5b b8 02 20 7b 95 e6 c8 51 9f c0 25 1e bf |.,[.. {...Q..%..|
00000030 c2 69 b4 43 e3 a1 f5 21 7c ee 8f 95 72 43 72 a9 |.i.C...!|...rCr.|
00000040 88 95 2b 27 af 12 |..+'..|
[740 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[741 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c82e0 gate 1578074091831309500 evaluation starts
[742 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c82e0 signed by 0 principal evaluation starts (used [false])
[743 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c82e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[744 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c82e0 principal evaluation succeeds for identity 0
[745 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c82e0 gate 1578074091831309500 evaluation succeeds
[746 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[747 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[748 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[749 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[74a 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051
[74b 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74c 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[74d 01-03 17:54:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74e 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11379403011736507807, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 338 bytes, Signature: 0 bytes
[74f 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 11379403011736507807, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 338 bytes, Signature: 0 bytes
[750 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[751 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11379403011736507807, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 338 bytes, Signature: 0 bytes
[752 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[753 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 b4 7d 68 2e 4d 54 87 38 75 08 bc dc 86 7e 91 |c.}h.MT.8u....~.|
00000010 5e c7 14 55 56 58 b4 10 2e 6c 51 14 5e 65 96 8f |^..UVX...lQ.^e..|
[754 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 9d e3 bb 20 7f 6e 93 3a 7d 5d |0E.!..... .n.:}]|
00000010 39 e6 c3 e5 e6 7f 6b 3f d3 e0 e7 5b e6 f4 be 13 |9.....k?...[....|
00000020 65 a8 b6 4a 1d 02 20 67 e1 4b 7e 83 8d 39 e6 0d |e..J.. g.K~..9..|
00000030 e2 e6 8b a0 39 93 0b c1 0f 2d a9 eb 24 ed ed 4d |....9....-..$..M|
00000040 f8 d1 b8 e5 7d c0 99 |....}..|
[755 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes
[756 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:17 , Envelope: 83 bytes, Signature: 71 bytes
[757 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[758 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[759 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75a 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[75b 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[75c 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[75d 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[75e 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[75f 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[760 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 a2 ca af 9e 74 85 43 d2 36 19 8c 81 22 ce 04 |.....t.C.6..."..|
00000010 d7 66 07 39 21 5a 05 d8 f2 20 44 4a b7 fb 6b eb |.f.9!Z... DJ..k.|
[761 01-03 17:54:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 35 80 22 e3 fc f3 5f af 01 91 |0E.!..5."..._...|
00000010 eb a2 34 68 80 31 60 e5 55 dc cb f9 88 cf de c9 |..4h.1`.U.......|
00000020 c9 70 27 97 ee 02 20 42 49 b6 ed ee ca 99 31 e7 |.p'... BI.....1.|
00000030 b8 a5 32 e7 c8 0c 56 37 35 b2 e4 5b 60 3e 8f bf |..2...V75..[`>..|
00000040 c0 7c 2e 24 7a 13 7f |.|.$z..|
[762 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[763 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d2f20 gate 1578074091850320700 evaluation starts
[764 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d2f20 signed by 0 principal evaluation starts (used [false])
[765 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d2f20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[766 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d2f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[767 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d2f20 principal evaluation fails
[768 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d2f20 gate 1578074091850320700 evaluation fails
[769 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[76a 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[76b 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[76c 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 a2 ca af 9e 74 85 43 d2 36 19 8c 81 22 ce 04 |.....t.C.6..."..|
00000010 d7 66 07 39 21 5a 05 d8 f2 20 44 4a b7 fb 6b eb |.f.9!Z... DJ..k.|
[76d 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 35 80 22 e3 fc f3 5f af 01 91 |0E.!..5."..._...|
00000010 eb a2 34 68 80 31 60 e5 55 dc cb f9 88 cf de c9 |..4h.1`.U.......|
00000020 c9 70 27 97 ee 02 20 42 49 b6 ed ee ca 99 31 e7 |.p'... BI.....1.|
00000030 b8 a5 32 e7 c8 0c 56 37 35 b2 e4 5b 60 3e 8f bf |..2...V75..[`>..|
00000040 c0 7c 2e 24 7a 13 7f |.|.$z..|
[76e 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[76f 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d3820 gate 1578074091854965400 evaluation starts
[770 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d3820 signed by 0 principal evaluation starts (used [false])
[771 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d3820 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[772 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d3820 principal evaluation succeeds for identity 0
[773 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d3820 gate 1578074091854965400 evaluation succeeds
[774 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[775 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[776 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[777 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[778 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes
[779 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}
[77a 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes
[77b 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77c 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77d 01-03 17:54:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77e 01-03 17:54:52.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:54.34Z grpc.peer_address=172.18.0.8:47376 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=166.6µs
[77f 01-03 17:54:52.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[780 01-03 17:54:52.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[781 01-03 17:54:52.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:47376
[782 01-03 17:54:52.34 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:47376
[783 01-03 17:54:52.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[784 01-03 17:54:52.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[785 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[786 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[787 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[788 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[789 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[78a 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[78b 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[78c 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[78d 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[78e 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[78f 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 29 3d 02 35 f5 20 74 ca 78 02 |0E.!..)=.5. t.x.|
00000010 68 e4 53 63 cd 23 04 6e 5a fd ce cb 20 11 85 41 |h.Sc.#.nZ... ..A|
00000020 67 83 53 60 15 02 20 76 33 50 e6 23 8b bf ba 0d |g.S`.. v3P.#....|
00000030 12 57 d8 2b 65 be f3 ea 88 fe 8b fc 7f 94 1b 88 |.W.+e...........|
00000040 49 94 fb 09 82 9a f6 |I......|
[790 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[791 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003439c20 gate 1578074092358224300 evaluation starts
[792 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003439c20 signed by 0 principal evaluation starts (used [false])
[793 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003439c20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[794 01-03 17:54:52.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003439c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[795 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003439c20 principal evaluation fails
[796 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003439c20 gate 1578074092358224300 evaluation fails
[797 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[798 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[799 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[79a 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[79b 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 29 3d 02 35 f5 20 74 ca 78 02 |0E.!..)=.5. t.x.|
00000010 68 e4 53 63 cd 23 04 6e 5a fd ce cb 20 11 85 41 |h.Sc.#.nZ... ..A|
00000020 67 83 53 60 15 02 20 76 33 50 e6 23 8b bf ba 0d |g.S`.. v3P.#....|
00000030 12 57 d8 2b 65 be f3 ea 88 fe 8b fc 7f 94 1b 88 |.W.+e...........|
00000040 49 94 fb 09 82 9a f6 |I......|
[79c 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[79d 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452520 gate 1578074092361272400 evaluation starts
[79e 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452520 signed by 0 principal evaluation starts (used [false])
[79f 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452520 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7a0 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452520 principal evaluation succeeds for identity 0
[7a1 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452520 gate 1578074092361272400 evaluation succeeds
[7a2 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7a3 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7a4 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7a5 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7a6 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:47376
[7a7 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:47376
[7a9 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7aa 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[7ab 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[7a8 01-03 17:54:52.36 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[7ac 01-03 17:54:52.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[7ad 01-03 17:54:52.38 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:47376 disconnected
[7ae 01-03 17:54:52.38 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:55:02.345Z grpc.peer_address=172.18.0.8:47376 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.2028ms
[7af 01-03 17:54:52.38 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7b0 01-03 17:54:52.38 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[7b1 01-03 17:54:52.41 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:54.418Z grpc.peer_address=172.18.0.8:47378 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=129.9µs
[7b2 01-03 17:54:52.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[7b3 01-03 17:54:52.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[7b4 01-03 17:54:52.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:47378
[7b5 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:47378
[7b6 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b7 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7b8 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b9 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7ba 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bb 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7bc 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7bd 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7be 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7bf 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7c0 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7c1 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[7c2 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab dd 86 0c 61 27 56 70 0c b2 51 |0E.!.....a'Vp..Q|
00000010 83 c8 e6 63 25 59 fc 35 5d 32 00 f2 4b 96 13 67 |...c%Y.5]2..K..g|
00000020 1f b7 d2 4a 73 02 20 74 33 3f 45 8a 91 85 16 49 |...Js. t3?E....I|
00000030 30 c6 03 fd 1a c4 da 9e 58 76 5f f8 a1 37 27 9a |0.......Xv_..7'.|
00000040 2b ae a9 57 a4 1c 79 |+..W..y|
[7c3 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7c4 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ba3a0 gate 1578074092434557100 evaluation starts
[7c5 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ba3a0 signed by 0 principal evaluation starts (used [false])
[7c6 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ba3a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7c7 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ba3a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7c8 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ba3a0 principal evaluation fails
[7c9 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ba3a0 gate 1578074092434557100 evaluation fails
[7ca 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7cb 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7cc 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7cd 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[7ce 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab dd 86 0c 61 27 56 70 0c b2 51 |0E.!.....a'Vp..Q|
00000010 83 c8 e6 63 25 59 fc 35 5d 32 00 f2 4b 96 13 67 |...c%Y.5]2..K..g|
00000020 1f b7 d2 4a 73 02 20 74 33 3f 45 8a 91 85 16 49 |...Js. t3?E....I|
00000030 30 c6 03 fd 1a c4 da 9e 58 76 5f f8 a1 37 27 9a |0.......Xv_..7'.|
00000040 2b ae a9 57 a4 1c 79 |+..W..y|
[7cf 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d0 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034baca0 gate 1578074092436496900 evaluation starts
[7d1 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034baca0 signed by 0 principal evaluation starts (used [false])
[7d2 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034baca0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7d3 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034baca0 principal evaluation succeeds for identity 0
[7d4 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034baca0 gate 1578074092436496900 evaluation succeeds
[7d5 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7d6 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7d7 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d8 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7d9 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:47378
[7da 01-03 17:54:52.43 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:47378
[7db 01-03 17:54:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47378 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 8242243132484074522, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes
[7dc 01-03 17:54:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7dd 01-03 17:54:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8242243132484074522, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes
[7de 01-03 17:54:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7df 01-03 17:54:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e0 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7e1 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7e2 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7e3 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e4 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e5 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e6 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 08 d6 8c 58 3d 74 ab bb d6 0f 82 f1 ff bb 63 |Z...X=t........c|
00000010 cb 95 48 2d 67 a2 54 b4 19 b3 dc af 5e 78 c5 64 |..H-g.T.....^x.d|
[7e7 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 7c 5f 70 0a 31 2f 07 96 64 fb |0E.!..|_p.1/..d.|
00000010 fe 09 e2 7f 68 82 b9 72 bb 6f 9b 63 d2 bf d7 bd |....h..r.o.c....|
00000020 0b f1 ac ff f2 02 20 3c 12 7d 27 67 aa a9 6d b9 |...... <.}'g..m.|
00000030 52 19 0d 6d 1e 26 c0 a0 83 5a a6 ef 16 5f fd 2e |R..m.&...Z..._..|
00000040 23 f8 c6 2d 67 55 13 |#..-gU.|
[7e8 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e9 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2cf0 gate 1578074092460689400 evaluation starts
[7ea 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2cf0 signed by 0 principal evaluation starts (used [false])
[7eb 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2cf0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7ec 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7ed 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2cf0 principal evaluation fails
[7ee 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2cf0 gate 1578074092460689400 evaluation fails
[7ef 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7f0 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7f1 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7f2 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 08 d6 8c 58 3d 74 ab bb d6 0f 82 f1 ff bb 63 |Z...X=t........c|
00000010 cb 95 48 2d 67 a2 54 b4 19 b3 dc af 5e 78 c5 64 |..H-g.T.....^x.d|
[7f3 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 7c 5f 70 0a 31 2f 07 96 64 fb |0E.!..|_p.1/..d.|
00000010 fe 09 e2 7f 68 82 b9 72 bb 6f 9b 63 d2 bf d7 bd |....h..r.o.c....|
00000020 0b f1 ac ff f2 02 20 3c 12 7d 27 67 aa a9 6d b9 |...... <.}'g..m.|
00000030 52 19 0d 6d 1e 26 c0 a0 83 5a a6 ef 16 5f fd 2e |R..m.&...Z..._..|
00000040 23 f8 c6 2d 67 55 13 |#..-gU.|
[7f4 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f5 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d35f0 gate 1578074092461375600 evaluation starts
[7f6 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d35f0 signed by 0 principal evaluation starts (used [false])
[7f7 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d35f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7f8 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d35f0 principal evaluation succeeds for identity 0
[7f9 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d35f0 gate 1578074092461375600 evaluation succeeds
[7fa 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7fb 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7fc 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7fd 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7fe 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes
[7ff 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes]}
[800 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:13
[801 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:13
[802 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[803 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[804 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[805 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[806 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[807 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[808 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[809 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 8242243132484074522, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers
[80a 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 3, Dead: 0
[80b 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8242243132484074522, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes
[80c 01-03 17:54:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80d 01-03 17:54:52.50 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:54.502Z grpc.peer_address=172.18.0.8:47380 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=148.8µs
[80e 01-03 17:54:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[80f 01-03 17:54:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[810 01-03 17:54:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:47380
[811 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:47380
[812 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[813 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[814 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[815 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[816 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[817 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[818 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[819 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[81a 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[81b 01-03 17:54:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[81c 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[81d 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[81e 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c d4 a4 7d b0 7a 22 c8 ec 6f 2a |0E.!....}.z"..o*|
00000010 88 5d 79 15 c4 69 23 ff 7a 4b 1d 93 0b 40 59 e0 |.]y..i#.zK...@Y.|
00000020 78 d8 3f b4 a8 02 20 79 9c aa 5d fb f2 b3 e3 07 |x.?... y..].....|
00000030 32 62 40 28 c1 ba 0c 80 75 f7 86 a4 d9 ec a8 d2 |2b@(....u.......|
00000040 2c f6 76 33 77 75 02 |,.v3wu.|
[81f 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[820 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5640 gate 1578074092541248400 evaluation starts
[821 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5640 signed by 0 principal evaluation starts (used [false])
[822 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5640 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[823 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[824 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5640 principal evaluation fails
[825 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5640 gate 1578074092541248400 evaluation fails
[826 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[827 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[828 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[829 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[82a 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c d4 a4 7d b0 7a 22 c8 ec 6f 2a |0E.!....}.z"..o*|
00000010 88 5d 79 15 c4 69 23 ff 7a 4b 1d 93 0b 40 59 e0 |.]y..i#.zK...@Y.|
00000020 78 d8 3f b4 a8 02 20 79 9c aa 5d fb f2 b3 e3 07 |x.?... y..].....|
00000030 32 62 40 28 c1 ba 0c 80 75 f7 86 a4 d9 ec a8 d2 |2b@(....u.......|
00000040 2c f6 76 33 77 75 02 |,.v3wu.|
[82b 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[82c 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5f40 gate 1578074092547799400 evaluation starts
[82d 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5f40 signed by 0 principal evaluation starts (used [false])
[82e 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5f40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[82f 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5f40 principal evaluation succeeds for identity 0
[830 01-03 17:54:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5f40 gate 1578074092547799400 evaluation succeeds
[831 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[832 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[833 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[834 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[835 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:47380
[836 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:47380
[837 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[838 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[839 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:47378 disconnected
[83a 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:47378 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.1232ms
[83b 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[83c 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[83d 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:47380 disconnected
[83e 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:55:02.512Z grpc.peer_address=172.18.0.8:47380 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=35.784ms
[83f 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[840 01-03 17:54:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[841 01-03 17:54:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[842 01-03 17:54:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[843 01-03 17:54:52.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:54.636Z grpc.peer_address=172.18.0.7:50032 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=189.5µs
[844 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[845 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[846 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:50032
[847 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:50032
[848 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[849 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84a 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[84b 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[84c 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[84d 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[84e 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84f 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[850 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[851 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[852 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[853 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[854 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[855 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[856 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[857 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[858 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[859 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 aa 7d b4 86 7e ec 5f 6b 1e f8 |0E.!...}..~._k..|
00000010 14 07 f0 37 47 4e 78 14 91 6c 08 a1 93 81 5b c0 |...7GNx..l....[.|
00000020 34 3d c6 6d 50 02 20 01 7b a7 6f 5e 2b cd f8 ea |4=.mP. .{.o^+...|
00000030 6e 1d e1 39 b8 26 27 b2 dc 94 02 87 b6 0e 51 1d |n..9.&'.......Q.|
00000040 1d 17 00 7a ae 85 d5 |...z...|
[85a 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[85b 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d7c0 gate 1578074092649435600 evaluation starts
[85c 01-03 17:54:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d7c0 signed by 0 principal evaluation starts (used [false])
[85d 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d7c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[85e 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[85f 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d7c0 principal evaluation fails
[860 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d7c0 gate 1578074092649435600 evaluation fails
[861 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[862 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[863 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[864 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[865 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 aa 7d b4 86 7e ec 5f 6b 1e f8 |0E.!...}..~._k..|
00000010 14 07 f0 37 47 4e 78 14 91 6c 08 a1 93 81 5b c0 |...7GNx..l....[.|
00000020 34 3d c6 6d 50 02 20 01 7b a7 6f 5e 2b cd f8 ea |4=.mP. .{.o^+...|
00000030 6e 1d e1 39 b8 26 27 b2 dc 94 02 87 b6 0e 51 1d |n..9.&'.......Q.|
00000040 1d 17 00 7a ae 85 d5 |...z...|
[866 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[867 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b40e0 gate 1578074092658546400 evaluation starts
[868 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b40e0 signed by 0 principal evaluation starts (used [false])
[869 01-03 17:54:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b40e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[86a 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[86b 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[86c 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b40e0 principal evaluation succeeds for identity 0
[86d 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b40e0 gate 1578074092658546400 evaluation succeeds
[86e 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[86f 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[870 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[871 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[872 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:50032
[873 01-03 17:54:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:50032
[874 01-03 17:54:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[875 01-03 17:54:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:50032 disconnected
[876 01-03 17:54:52.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:55:02.639Z grpc.peer_address=172.18.0.7:50032 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.9634ms
[877 01-03 17:54:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[878 01-03 17:54:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[879 01-03 17:54:52.68 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:54.682Z grpc.peer_address=172.18.0.7:50034 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.3µs
[87a 01-03 17:54:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[87b 01-03 17:54:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[87c 01-03 17:54:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:50034
[87d 01-03 17:54:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:50034
[87e 01-03 17:54:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87f 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[880 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[881 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[882 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[883 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[884 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[885 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[886 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[887 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[888 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[889 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[88a 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 4d 9d 1a a0 8f a7 ee af 60 cd |0E.!..M.......`.|
00000010 43 92 9c cf f8 4e b1 c1 51 99 d7 40 64 35 44 11 |C....N..Q..@d5D.|
00000020 8c 80 35 2e 59 02 20 51 56 08 2b 27 eb fe 44 78 |..5.Y. QV.+'..Dx|
00000030 61 ba 55 37 b9 a0 4a e5 77 f4 e2 b2 82 69 25 06 |a.U7..J.w....i%.|
00000040 34 13 27 7d 9d d5 1f |4.'}...|
[88b 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[88c 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036120b0 gate 1578074092698724400 evaluation starts
[88d 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036120b0 signed by 0 principal evaluation starts (used [false])
[88e 01-03 17:54:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036120b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[88f 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036120b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[890 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036120b0 principal evaluation fails
[891 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036120b0 gate 1578074092698724400 evaluation fails
[892 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[893 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[894 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[895 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[896 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 4d 9d 1a a0 8f a7 ee af 60 cd |0E.!..M.......`.|
00000010 43 92 9c cf f8 4e b1 c1 51 99 d7 40 64 35 44 11 |C....N..Q..@d5D.|
00000020 8c 80 35 2e 59 02 20 51 56 08 2b 27 eb fe 44 78 |..5.Y. QV.+'..Dx|
00000030 61 ba 55 37 b9 a0 4a e5 77 f4 e2 b2 82 69 25 06 |a.U7..J.w....i%.|
00000040 34 13 27 7d 9d d5 1f |4.'}...|
[897 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[898 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036129b0 gate 1578074092704956800 evaluation starts
[899 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036129b0 signed by 0 principal evaluation starts (used [false])
[89a 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036129b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[89b 01-03 17:54:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036129b0 principal evaluation succeeds for identity 0
[89c 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036129b0 gate 1578074092704956800 evaluation succeeds
[89d 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[89e 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[89f 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8a0 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8a1 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:50034
[8a2 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:50034
[8a3 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50034 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 12712601662864945557, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[8a4 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a5 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12712601662864945557, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[8a6 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[8a7 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a8 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8a9 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8aa 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8ab 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8ac 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8ad 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8ae 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 38 d8 a4 f2 e1 10 07 cd 81 37 d5 41 69 b7 47 |.8........7.Ai.G|
00000010 3c bd 79 be 12 11 40 15 79 7f ad fd 0b 56 0f 6a |<.y...@.y....V.j|
[8af 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 18 eb c4 cf da 8f 0d a6 8b 6c |0E.!...........l|
00000010 bb a9 af 3d 86 fc 8b 9d cc 59 15 84 30 be 26 b0 |...=.....Y..0.&.|
00000020 1c c2 98 12 dc 02 20 23 85 15 b9 71 2b 43 e8 f6 |...... #...q+C..|
00000030 cf b6 e9 44 29 6e ca 38 bc 2d d0 6c 12 82 3e b1 |...D)n.8.-.l..>.|
00000040 eb b2 0c 7e a4 14 85 |...~...|
[8b0 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b1 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e870 gate 1578074092717255200 evaluation starts
[8b2 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e870 signed by 0 principal evaluation starts (used [false])
[8b3 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e870 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8b4 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8b5 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e870 principal evaluation fails
[8b6 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e870 gate 1578074092717255200 evaluation fails
[8b7 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8b8 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8b9 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8ba 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 38 d8 a4 f2 e1 10 07 cd 81 37 d5 41 69 b7 47 |.8........7.Ai.G|
00000010 3c bd 79 be 12 11 40 15 79 7f ad fd 0b 56 0f 6a |<.y...@.y....V.j|
[8bb 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 18 eb c4 cf da 8f 0d a6 8b 6c |0E.!...........l|
00000010 bb a9 af 3d 86 fc 8b 9d cc 59 15 84 30 be 26 b0 |...=.....Y..0.&.|
00000020 1c c2 98 12 dc 02 20 23 85 15 b9 71 2b 43 e8 f6 |...... #...q+C..|
00000030 cf b6 e9 44 29 6e ca 38 bc 2d d0 6c 12 82 3e b1 |...D)n.8.-.l..>.|
00000040 eb b2 0c 7e a4 14 85 |...~...|
[8bc 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8bd 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f170 gate 1578074092717900400 evaluation starts
[8be 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f170 signed by 0 principal evaluation starts (used [false])
[8bf 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f170 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8c0 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f170 principal evaluation succeeds for identity 0
[8c1 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f170 gate 1578074092717900400 evaluation succeeds
[8c2 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8c3 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8c4 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8c5 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8c6 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes
[8c7 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}
[8c8 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes
[8c9 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ca 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cb 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cc 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[8cd 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ce 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cf 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d0 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12712601662864945557, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers
[8d1 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8d2 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12712601662864945557, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes
[8d3 01-03 17:54:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d4 01-03 17:54:52.79 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:54.792Z grpc.peer_address=172.18.0.7:50036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=222.8µs
[8d5 01-03 17:54:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[8d6 01-03 17:54:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[8d7 01-03 17:54:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:50036
[8d8 01-03 17:54:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:50036
[8d9 01-03 17:54:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8da 01-03 17:54:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8db 01-03 17:54:52.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8dc 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8dd 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8de 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8df 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8e0 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8e1 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8e2 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8e3 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8e4 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[8e5 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 1c 9b f0 19 0e c2 96 d4 3a 6c |0E.!..........:l|
00000010 2a ba 7e cb 1b b0 43 e6 ea 10 1d 23 6b ea ea 35 |*.~...C....#k..5|
00000020 ea b3 01 98 08 02 20 5c f1 28 dc 01 ea 44 61 8f |...... \.(...Da.|
00000030 24 eb e4 90 0b df 2e c4 f5 21 6c c1 43 c5 17 09 |$........!l.C...|
00000040 9f 16 75 88 d3 2e 95 |..u....|
[8e6 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e7 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dc80 gate 1578074092803196400 evaluation starts
[8e8 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dc80 signed by 0 principal evaluation starts (used [false])
[8e9 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dc80 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8ea 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dc80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8eb 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dc80 principal evaluation fails
[8ec 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dc80 gate 1578074092803196400 evaluation fails
[8ed 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8ee 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8ef 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f0 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[8f1 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 1c 9b f0 19 0e c2 96 d4 3a 6c |0E.!..........:l|
00000010 2a ba 7e cb 1b b0 43 e6 ea 10 1d 23 6b ea ea 35 |*.~...C....#k..5|
00000020 ea b3 01 98 08 02 20 5c f1 28 dc 01 ea 44 61 8f |...... \.(...Da.|
00000030 24 eb e4 90 0b df 2e c4 f5 21 6c c1 43 c5 17 09 |$........!l.C...|
00000040 9f 16 75 88 d3 2e 95 |..u....|
[8f2 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f3 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698580 gate 1578074092806123400 evaluation starts
[8f4 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698580 signed by 0 principal evaluation starts (used [false])
[8f5 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698580 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8f6 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698580 principal evaluation succeeds for identity 0
[8f7 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698580 gate 1578074092806123400 evaluation succeeds
[8f8 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f9 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8fa 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8fb 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8fc 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:50036
[8fd 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:50036
[8fe 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8ff 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[900 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:50034 disconnected
[901 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:50034 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=121.6485ms
[902 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[903 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[904 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[905 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:50036 disconnected
[906 01-03 17:54:52.80 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:55:02.794Z grpc.peer_address=172.18.0.7:50036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=13.4002ms
[907 01-03 17:54:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[908 01-03 17:54:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[909 01-03 17:54:53.08 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:54:55.084Z grpc.peer_address=172.18.0.5:57826 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146.6µs
[90a 01-03 17:54:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[90b 01-03 17:54:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[90c 01-03 17:54:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:57826
[90d 01-03 17:54:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:57826
[90e 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|
[90f 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 c2 d3 e5 48 19 ce 37 7a 62 4b |0E.!.....H..7zbK|
00000010 14 78 88 aa b4 d5 cd 7b b7 3f 3d eb ba 5f 48 1a |.x.....{.?=.._H.|
00000020 7a 8b 8b a0 68 02 20 7b 0c 9b 22 ab 8f 93 99 9d |z...h. {..".....|
00000030 b6 ac d6 1d 30 24 3a 81 93 06 8c 9b d4 f4 ec ca |....0$:.........|
00000040 08 bc 28 82 93 74 df |..(..t.|
[910 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:57826
[911 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:57826
[912 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes
[913 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[914 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes
[915 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[916 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[917 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[918 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[919 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[91a 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[91b 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[91c 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[91d 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 89 a8 0a 31 1e 39 0d c5 44 ec 4f b3 2d dc bc |....1.9..D.O.-..|
00000010 8c f4 00 9d ab 91 ee 99 bf 9f a3 54 99 0e 8a aa |...........T....|
[91e 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 a6 ca 9a 56 dc 89 40 54 87 b4 4a |0D. a...V..@T..J|
00000010 39 19 32 c3 45 51 dd 95 e0 e6 b3 e4 b6 0b 16 e1 |9.2.EQ..........|
00000020 ef 26 db 06 02 20 61 ff 61 a5 df ce 28 09 cd ca |.&... a.a...(...|
00000030 3a e7 5b e8 9a 09 35 77 2e e1 37 52 b7 da a8 4e |:.[...5w..7R...N|
00000040 6f 2b 29 97 58 13 |o+).X.|
[91f 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[920 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fcb70 gate 1578074093097269400 evaluation starts
[921 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fcb70 signed by 0 principal evaluation starts (used [false])
[922 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fcb70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[923 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fcb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[924 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fcb70 principal evaluation fails
[925 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fcb70 gate 1578074093097269400 evaluation fails
[926 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[927 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[928 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[929 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 89 a8 0a 31 1e 39 0d c5 44 ec 4f b3 2d dc bc |....1.9..D.O.-..|
00000010 8c f4 00 9d ab 91 ee 99 bf 9f a3 54 99 0e 8a aa |...........T....|
[92a 01-03 17:54:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 a6 ca 9a 56 dc 89 40 54 87 b4 4a |0D. a...V..@T..J|
00000010 39 19 32 c3 45 51 dd 95 e0 e6 b3 e4 b6 0b 16 e1 |9.2.EQ..........|
00000020 ef 26 db 06 02 20 61 ff 61 a5 df ce 28 09 cd ca |.&... a.a...(...|
00000030 3a e7 5b e8 9a 09 35 77 2e e1 37 52 b7 da a8 4e |:.[...5w..7R...N|
00000040 6f 2b 29 97 58 13 |o+).X.|
[92b 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[92c 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd470 gate 1578074093101777500 evaluation starts
[92d 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd470 signed by 0 principal evaluation starts (used [false])
[92e 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd470 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[92f 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd470 principal evaluation succeeds for identity 0
[930 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fd470 gate 1578074093101777500 evaluation succeeds
[931 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[932 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[933 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[934 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[935 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes
[936 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes]}
[937 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19
[938 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19
[939 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[93a 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93b 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93c 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93d 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93e 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93f 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[940 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[941 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[942 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[943 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[944 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[945 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[946 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[947 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[948 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes
[949 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[94a 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[94b 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[94c 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] <nil>}
[94d 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[94e 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037467f0, CONNECTING
[94f 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes
[950 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[951 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[952 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[953 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 <nil>}] <nil>}
[954 01-03 17:54:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[955 01-03 17:54:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003768160, CONNECTING
[956 01-03 17:54:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003768160, READY
[957 01-03 17:54:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[958 01-03 17:54:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[959 01-03 17:54:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051
[95a 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051
[95b 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[95c 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[95d 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[95e 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[95f 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[960 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[961 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[962 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[963 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[964 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[965 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[966 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[967 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 48 74 2e 8a 74 01 98 f6 ec 80 |0E.!..Ht..t.....|
00000010 7a f9 77 09 30 e2 e6 d3 4b 64 bf d4 ea 11 61 94 |z.w.0...Kd....a.|
00000020 bb ba 2b 0c 0c 02 20 75 ea 1d c6 9d 09 8f 75 d8 |..+... u......u.|
00000030 82 6d e0 f5 79 5e 5f 21 8c 65 e3 f6 63 15 2d 20 |.m..y^_!.e..c.- |
00000040 ee 3c 83 e8 5e cf 1a |.<..^..|
[968 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[969 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb160 gate 1578074093146232800 evaluation starts
[96a 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb160 signed by 0 principal evaluation starts (used [false])
[96b 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb160 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[96c 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[96d 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb160 principal evaluation fails
[96e 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb160 gate 1578074093146232800 evaluation fails
[96f 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[970 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[971 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[972 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[973 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 48 74 2e 8a 74 01 98 f6 ec 80 |0E.!..Ht..t.....|
00000010 7a f9 77 09 30 e2 e6 d3 4b 64 bf d4 ea 11 61 94 |z.w.0...Kd....a.|
00000020 bb ba 2b 0c 0c 02 20 75 ea 1d c6 9d 09 8f 75 d8 |..+... u......u.|
00000030 82 6d e0 f5 79 5e 5f 21 8c 65 e3 f6 63 15 2d 20 |.m..y^_!.e..c.- |
00000040 ee 3c 83 e8 5e cf 1a |.<..^..|
[974 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[975 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cba60 gate 1578074093146884500 evaluation starts
[976 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cba60 signed by 0 principal evaluation starts (used [false])
[977 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cba60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[978 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cba60 principal evaluation succeeds for identity 0
[979 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cba60 gate 1578074093146884500 evaluation succeeds
[97a 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[97b 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[97c 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[97d 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[97e 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051
[97f 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[980 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[981 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[982 01-03 17:54:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037467f0, READY
[983 01-03 17:54:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[984 01-03 17:54:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[985 01-03 17:54:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051
[986 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051
[987 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[988 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[989 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[98a 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[98b 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[98c 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[98d 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[98e 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[98f 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[990 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[991 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[992 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[993 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 2d 3f 6e b1 7b ef 66 f9 eb a4 4b |0D. .-?n.{.f...K|
00000010 9f 20 e5 8f 47 39 d8 ca 15 43 0e d5 f6 05 90 ad |. ..G9...C......|
00000020 2e 65 a3 87 02 20 78 0c aa f5 96 83 aa f7 33 79 |.e... x.......3y|
00000030 9d dd d3 2e 75 c6 c7 4e 5e e8 19 97 b0 17 68 af |....u..N^.....h.|
00000040 8c e4 22 82 e3 7c |.."..||
[994 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[995 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381be80 gate 1578074093162054700 evaluation starts
[996 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381be80 signed by 0 principal evaluation starts (used [false])
[997 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381be80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[998 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381be80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[999 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381be80 principal evaluation fails
[99a 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381be80 gate 1578074093162054700 evaluation fails
[99b 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[99c 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[99d 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[99e 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[99f 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 2d 3f 6e b1 7b ef 66 f9 eb a4 4b |0D. .-?n.{.f...K|
00000010 9f 20 e5 8f 47 39 d8 ca 15 43 0e d5 f6 05 90 ad |. ..G9...C......|
00000020 2e 65 a3 87 02 20 78 0c aa f5 96 83 aa f7 33 79 |.e... x.......3y|
00000030 9d dd d3 2e 75 c6 c7 4e 5e e8 19 97 b0 17 68 af |....u..N^.....h.|
00000040 8c e4 22 82 e3 7c |.."..||
[9a0 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9a1 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836780 gate 1578074093166849200 evaluation starts
[9a2 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836780 signed by 0 principal evaluation starts (used [false])
[9a3 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836780 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9a4 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836780 principal evaluation succeeds for identity 0
[9a5 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836780 gate 1578074093166849200 evaluation succeeds
[9a6 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9a7 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9a8 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9a9 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9aa 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051
[9ab 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ac 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[9ad 01-03 17:54:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ae 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151012
[9af 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D87647F4522DD4DA0100E42858C8A5AA8931B620668173333F23CC89C2E7B023
[9b0 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[9b1 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[9b2 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[9b3 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[9b4 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13010304800944588003 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[9b5 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9b7 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13010304800944588003 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[9b8 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9b9 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9ba 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9bb 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[9b6 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[9bc 01-03 17:54:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1571398140282431546 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[9bd 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[9be 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15843416432673613490 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[9bf 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15843416432673613490 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[9c0 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9c1 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1571398140282431546 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9c2 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9c3 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13010304800944588003 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes
[9c4 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13010304800944588003 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes
[9c5 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13010304800944588003 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes
[9c6 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9c7 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15843416432673613490 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes
[9c8 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15843416432673613490 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 85 bytes, Signature: 0 bytes
[9c9 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ca 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes
[9cb 01-03 17:54:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9cc 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1571398140282431546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes
[9cd 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1571398140282431546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes
[9ce 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1571398140282431546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes
[9cf 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9d0 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151013
[9d1 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8F7B207F945CA2E0231CBD8BA8145791AF3F48FB12C2649D07736D22D55554BA
[9d2 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[9d3 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[9d4 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9d5 01-03 17:54:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[9d6 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[9d7 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9d8 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[9d9 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[9da 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9db 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[9dc 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9dd 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[9de 01-03 17:54:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9df 01-03 17:54:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[9e0 01-03 17:54:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9e1 01-03 17:54:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[9e2 01-03 17:54:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[9e3 01-03 17:54:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 7b 20 7f 94 5c a2 e0 23 1c bd 8b a8 14 57 91 |.{ ..\..#.....W.|
00000010 af 3f 48 fb 12 c2 64 9d 07 73 6d 22 d5 55 54 ba |.?H...d..sm".UT.|
[9e4 01-03 17:54:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 60 4c 0e 74 d5 e5 1c 8c 77 d5 |0E.!..`L.t....w.|
00000010 3b fc 47 a3 a7 de d7 02 ae 47 28 8f dd e7 dd 18 |;.G......G(.....|
00000020 f5 2b c4 c3 15 02 20 47 4d 44 c9 76 16 3d 97 e5 |.+.... GMD.v.=..|
00000030 7b fe 30 e3 f9 d3 ed 5b f7 71 d3 72 ce 63 93 7a |{.0....[.q.r.c.z|
00000040 d5 a0 70 cc c5 37 55 |..p..7U|
[9e5 01-03 17:54:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[9e6 01-03 17:54:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 45 fd 4a 6f 08 5f af b6 73 b7 01 |0D. EE.Jo._..s..|
00000010 6d bd f1 33 7b 07 83 0e ad 16 22 8c c2 a9 04 79 |m..3{....."....y|
00000020 25 69 e5 c3 02 20 62 84 c1 1e 26 0d ad 80 e6 6c |%i... b...&....l|
00000030 b9 ba bc 47 a6 3f 9d 71 f1 02 32 e8 fc 59 5f 6d |...G.?.q..2..Y_m|
00000040 d9 82 37 fb 4b 10 |..7.K.|
[9e7 01-03 17:54:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[9e8 01-03 17:54:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[9e9 01-03 17:54:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ea 01-03 17:54:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[9eb 01-03 17:54:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[9ec 01-03 17:54:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9ed 01-03 17:54:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[9ee 01-03 17:54:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes
[9ef 01-03 17:54:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9f0 01-03 17:54:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9f1 01-03 17:54:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9f2 01-03 17:54:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 59 95 e2 61 4e bd 95 73 11 29 0d f9 6a 5a c8 |.Y..aN..s.)..jZ.|
00000010 29 6c 57 8c de 35 67 92 74 f1 cf a2 a5 bc e2 33 |)lW..5g.t......3|
[9f4 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 19 8b 07 67 05 0c 65 23 ef a1 a9 |0D. 9...g..e#...|
00000010 dc 24 ce b4 9a 90 7a 0f d8 e3 96 db 2e 09 bc 2d |.$....z........-|
00000020 2a c9 8e 49 02 20 33 d8 cc 29 5b d0 b3 ba 31 cd |*..I. 3..)[...1.|
00000030 ad 0b ce 73 c2 47 b1 8c d9 e0 4f eb 4a 43 bb 64 |...s.G....O.JC.d|
00000040 bf aa 62 4e b5 67 |..bN.g|
[9f5 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[9f3 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes
[9f7 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes
[9f6 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f a1 c2 bb 67 d2 7d ba 8b f4 dd b2 |0D. /...g.}.....|
00000010 43 b0 ea 1a ce 7f 9b be 54 fa 34 ad cb 87 d4 bb |C.......T.4.....|
00000020 d1 98 a9 63 02 20 7f 64 55 01 6b e3 79 dc 26 06 |...c. .dU.k.y.&.|
00000030 f6 5c 97 9a 07 9f 47 a7 06 fa 26 df ec 32 c2 28 |.\....G...&..2.(|
00000040 7d 56 d6 90 26 6c |}V..&l|
[9f8 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[9f9 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[9fa 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:21
[9fb 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:21
[9fc 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[9fd 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9fe 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ff 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a01 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a00 01-03 17:54:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes
[a02 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[a03 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a04 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[a05 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[a06 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[a07 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[a08 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[a09 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[a0a 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[a0b 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[a0c 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 3b 52 70 57 1c 2e 10 2b 42 1f 15 e4 54 4b 5b |o;RpW...+B...TK[|
00000010 ae df d7 fb 0c 37 b2 04 1f ac 88 4f 66 3e 2d 81 |.....7.....Of>-.|
[a0d 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 05 05 a4 a0 9b 6b 6c b2 c6 b3 |0E.!.......kl...|
00000010 23 cf e2 66 84 4d 26 58 52 35 81 5e 31 0c be ff |#..f.M&XR5.^1...|
00000020 4c 79 94 59 07 02 20 10 be 72 7d 12 cc 98 2c 22 |Ly.Y.. ..r}...,"|
00000030 4d 09 85 0b ef 5e 67 4f 43 95 00 cc 62 e6 55 d4 |M....^gOC...b.U.|
00000040 f5 61 87 bc eb ca 79 |.a....y|
[a0e 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a0f 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aa270 gate 1578074093347309100 evaluation starts
[a10 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aa270 signed by 0 principal evaluation starts (used [false])
[a11 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aa270 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[a12 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aa270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[a13 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aa270 principal evaluation fails
[a14 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aa270 gate 1578074093347309100 evaluation fails
[a15 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[a16 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[a17 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[a18 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 3b 52 70 57 1c 2e 10 2b 42 1f 15 e4 54 4b 5b |o;RpW...+B...TK[|
00000010 ae df d7 fb 0c 37 b2 04 1f ac 88 4f 66 3e 2d 81 |.....7.....Of>-.|
[a19 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 05 05 a4 a0 9b 6b 6c b2 c6 b3 |0E.!.......kl...|
00000010 23 cf e2 66 84 4d 26 58 52 35 81 5e 31 0c be ff |#..f.M&XR5.^1...|
00000020 4c 79 94 59 07 02 20 10 be 72 7d 12 cc 98 2c 22 |Ly.Y.. ..r}...,"|
00000030 4d 09 85 0b ef 5e 67 4f 43 95 00 cc 62 e6 55 d4 |M....^gOC...b.U.|
00000040 f5 61 87 bc eb ca 79 |.a....y|
[a1a 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a1b 01-03 17:54:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aab70 gate 1578074093349845800 evaluation starts
[a1c 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aab70 signed by 0 principal evaluation starts (used [false])
[a1d 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aab70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[a1e 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aab70 principal evaluation succeeds for identity 0
[a1f 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038aab70 gate 1578074093349845800 evaluation succeeds
[a20 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[a21 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[a22 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[a23 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[a24 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes
[a25 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes]}
[a26 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:20
[a27 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:20
[a28 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[a29 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a2a 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a2b 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[a2c 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 7b 20 7f 94 5c a2 e0 23 1c bd 8b a8 14 57 91 |.{ ..\..#.....W.|
00000010 af 3f 48 fb 12 c2 64 9d 07 73 6d 22 d5 55 54 ba |.?H...d..sm".UT.|
[a2d 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 60 4c 0e 74 d5 e5 1c 8c 77 d5 |0E.!..`L.t....w.|
00000010 3b fc 47 a3 a7 de d7 02 ae 47 28 8f dd e7 dd 18 |;.G......G(.....|
00000020 f5 2b c4 c3 15 02 20 47 4d 44 c9 76 16 3d 97 e5 |.+.... GMD.v.=..|
00000030 7b fe 30 e3 f9 d3 ed 5b f7 71 d3 72 ce 63 93 7a |{.0....[.q.r.c.z|
00000040 d5 a0 70 cc c5 37 55 |..p..7U|
[a2e 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes
[a2f 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes
[a30 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a31 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[a32 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a33 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[a34 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[a35 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[a36 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[a37 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[a38 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[a39 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3d a7 bc 9b 97 e5 2d ab 9c 27 3b f1 68 3f 11 |/=.....-..';.h?.|
00000010 30 49 89 7b fe 5d 71 94 4a a4 ee 3e ce dd 9a 54 |0I.{.]q.J..>...T|
[a3a 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 2f f0 32 a8 36 24 e7 bd 25 0f 39 |0D. 9/.2.6$..%.9|
00000010 b3 84 1b d4 c3 1b b4 7c 4d 84 a2 7f bd e0 8e f4 |.......|M.......|
00000020 8e b6 90 73 02 20 73 3a 17 3e 43 0a 8a 4b 30 36 |...s. s:.>C..K06|
00000030 17 d9 40 53 76 2f 55 94 da ba 4d ec d0 23 ff 27 |..@Sv/U...M..#.'|
00000040 b3 ff a5 33 30 8e |...30.|
[a3b 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a3c 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bf790 gate 1578074093357680100 evaluation starts
[a3d 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bf790 signed by 0 principal evaluation starts (used [false])
[a3e 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bf790 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[a3f 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bf790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[a40 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bf790 principal evaluation fails
[a41 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bf790 gate 1578074093357680100 evaluation fails
[a42 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[a43 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[a44 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[a45 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3d a7 bc 9b 97 e5 2d ab 9c 27 3b f1 68 3f 11 |/=.....-..';.h?.|
00000010 30 49 89 7b fe 5d 71 94 4a a4 ee 3e ce dd 9a 54 |0I.{.]q.J..>...T|
[a46 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 2f f0 32 a8 36 24 e7 bd 25 0f 39 |0D. 9/.2.6$..%.9|
00000010 b3 84 1b d4 c3 1b b4 7c 4d 84 a2 7f bd e0 8e f4 |.......|M.......|
00000020 8e b6 90 73 02 20 73 3a 17 3e 43 0a 8a 4b 30 36 |...s. s:.>C..K06|
00000030 17 d9 40 53 76 2f 55 94 da ba 4d ec d0 23 ff 27 |..@Sv/U...M..#.'|
00000040 b3 ff a5 33 30 8e |...30.|
[a47 01-03 17:54:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a48 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0090 gate 1578074093360036000 evaluation starts
[a49 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0090 signed by 0 principal evaluation starts (used [false])
[a4a 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0090 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[a4b 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0090 principal evaluation succeeds for identity 0
[a4c 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0090 gate 1578074093360036000 evaluation succeeds
[a4d 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[a4e 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[a4f 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[a50 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[a51 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[a52 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}
[a53 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:21
[a54 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:21
[a55 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[a56 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a57 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a58 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a59 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a5a 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[a5b 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[a5c 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a5d 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[a5e 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[a5f 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[a60 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[a61 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[a62 01-03 17:54:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[a63 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e7 fd e0 07 da 20 35 79 aa 5d 59 69 53 68 8c |...... 5y.]YiSh.|
00000010 58 87 e7 38 bb a7 eb 63 5c 2f 01 f2 0b 7c a7 1d |X..8...c\/...|..|
[a64 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a e7 61 98 f3 d5 57 9b dd 22 31 |0E.!...a...W.."1|
00000010 6b 3c ba e0 05 51 9e 0c 04 5d 45 8a 0d 85 ff 5b |k<...Q...]E....[|
00000020 13 ef 6b 8b e8 02 20 6c 5a a4 b9 3d d1 d3 80 04 |..k... lZ..=....|
00000030 8b 52 5f a8 5d 26 92 e6 43 a5 87 c2 e7 5b 8e b0 |.R_.]&..C....[..|
00000040 9e 5d 37 f3 80 46 3e |.]7..F>|
[a65 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a66 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ec3c0 gate 1578074093370411600 evaluation starts
[a67 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ec3c0 signed by 0 principal evaluation starts (used [false])
[a68 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ec3c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[a69 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ec3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[a6a 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ec3c0 principal evaluation fails
[a6b 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ec3c0 gate 1578074093370411600 evaluation fails
[a6c 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[a6d 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[a6e 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[a6f 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e7 fd e0 07 da 20 35 79 aa 5d 59 69 53 68 8c |...... 5y.]YiSh.|
00000010 58 87 e7 38 bb a7 eb 63 5c 2f 01 f2 0b 7c a7 1d |X..8...c\/...|..|
[a70 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a e7 61 98 f3 d5 57 9b dd 22 31 |0E.!...a...W.."1|
00000010 6b 3c ba e0 05 51 9e 0c 04 5d 45 8a 0d 85 ff 5b |k<...Q...]E....[|
00000020 13 ef 6b 8b e8 02 20 6c 5a a4 b9 3d d1 d3 80 04 |..k... lZ..=....|
00000030 8b 52 5f a8 5d 26 92 e6 43 a5 87 c2 e7 5b 8e b0 |.R_.]&..C....[..|
00000040 9e 5d 37 f3 80 46 3e |.]7..F>|
[a71 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a72 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038eccc0 gate 1578074093372154700 evaluation starts
[a73 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038eccc0 signed by 0 principal evaluation starts (used [false])
[a74 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038eccc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[a75 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038eccc0 principal evaluation succeeds for identity 0
[a76 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038eccc0 gate 1578074093372154700 evaluation succeeds
[a77 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[a78 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[a79 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[a7a 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[a7b 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[a7c 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}
[a7d 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:22
[a7e 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:22
[a7f 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[a80 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a81 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a82 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[a83 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 59 95 e2 61 4e bd 95 73 11 29 0d f9 6a 5a c8 |.Y..aN..s.)..jZ.|
00000010 29 6c 57 8c de 35 67 92 74 f1 cf a2 a5 bc e2 33 |)lW..5g.t......3|
[a84 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 19 8b 07 67 05 0c 65 23 ef a1 a9 |0D. 9...g..e#...|
00000010 dc 24 ce b4 9a 90 7a 0f d8 e3 96 db 2e 09 bc 2d |.$....z........-|
00000020 2a c9 8e 49 02 20 33 d8 cc 29 5b d0 b3 ba 31 cd |*..I. 3..)[...1.|
00000030 ad 0b ce 73 c2 47 b1 8c d9 e0 4f eb 4a 43 bb 64 |...s.G....O.JC.d|
00000040 bf aa 62 4e b5 67 |..bN.g|
[a85 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[a86 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a87 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[a88 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 7b 20 7f 94 5c a2 e0 23 1c bd 8b a8 14 57 91 |.{ ..\..#.....W.|
00000010 af 3f 48 fb 12 c2 64 9d 07 73 6d 22 d5 55 54 ba |.?H...d..sm".UT.|
[a89 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 60 4c 0e 74 d5 e5 1c 8c 77 d5 |0E.!..`L.t....w.|
00000010 3b fc 47 a3 a7 de d7 02 ae 47 28 8f dd e7 dd 18 |;.G......G(.....|
00000020 f5 2b c4 c3 15 02 20 47 4d 44 c9 76 16 3d 97 e5 |.+.... GMD.v.=..|
00000030 7b fe 30 e3 f9 d3 ed 5b f7 71 d3 72 ce 63 93 7a |{.0....[.q.r.c.z|
00000040 d5 a0 70 cc c5 37 55 |..p..7U|
[a8a 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes
[a8b 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes
[a8c 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a8d 01-03 17:54:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a8e 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a8f 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a90 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[a91 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[a92 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a93 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[a94 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a95 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[a96 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a97 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes
[a98 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes
[a9a 01-03 17:54:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[a9b 01-03 17:54:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17855144128857206230 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[a9c 01-03 17:54:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17855144128857206230 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[a9d 01-03 17:54:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a9e 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa0 01-03 17:54:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a9f 01-03 17:54:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes
[a99 01-03 17:54:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa1 01-03 17:54:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa2 01-03 17:54:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa4 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074091789880400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers
[aa5 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa9 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa3 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[aa6 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074091789880400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes
[aa7 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074091789880400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes
[aa8 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074091789880400 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes
[aaa 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[aae 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[aaf 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[ab0 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[aab 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[aac 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[aad 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ab1 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[ab2 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[ab3 01-03 17:54:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[ab4 01-03 17:54:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ab5 01-03 17:54:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a980 gate 1578074093549264300 evaluation starts
[ab6 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a980 signed by 0 principal evaluation starts (used [false])
[ab7 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a980 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[ab8 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[ab9 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a980 principal evaluation fails
[aba 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a980 gate 1578074093549264300 evaluation fails
[abb 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[abc 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[abd 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[abe 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[abf 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[ac0 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ac1 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b280 gate 1578074093556878800 evaluation starts
[ac2 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b280 signed by 0 principal evaluation starts (used [false])
[ac3 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b280 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[ac4 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b280 principal evaluation succeeds for identity 0
[ac5 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b280 gate 1578074093556878800 evaluation succeeds
[ac6 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[ac7 01-03 17:54:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[ac8 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[ac9 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[aca 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[acb 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[acc 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[acd 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[ace 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[acf 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[ad0 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[ad1 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[ad2 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ad3 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948010 gate 1578074093565290000 evaluation starts
[ad4 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948010 signed by 0 principal evaluation starts (used [false])
[ad5 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948010 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[ad6 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[ad7 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948010 principal evaluation fails
[ad8 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948010 gate 1578074093565290000 evaluation fails
[ad9 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[ada 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[adb 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[adc 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[add 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[ade 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[adf 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948910 gate 1578074093567615500 evaluation starts
[ae0 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948910 signed by 0 principal evaluation starts (used [false])
[ae1 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948910 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[ae2 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948910 principal evaluation succeeds for identity 0
[ae3 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948910 gate 1578074093567615500 evaluation succeeds
[ae4 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[ae5 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[ae6 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[ae7 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[ae8 01-03 17:54:53.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ae9 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes
[aea 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b e9 58 1f 19 e4 cd a6 e6 b1 63 f8 6d bc 1d 17 |..X.......c.m...|
00000010 e7 25 af 7b 8d 8a ef df 11 cb ee 9d 02 10 18 5a |.%.{...........Z|
[aeb 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 74 39 a8 7b 4e ca 48 fe c6 f6 |0E.!..t9.{N.H...|
00000010 98 0c 22 79 b0 9d 62 00 0f 76 b8 6a af 14 c4 bc |.."y..b..v.j....|
00000020 9d d1 5c ba ff 02 20 15 d6 77 af 21 62 f1 0d 1d |..\... ..w.!b...|
00000030 14 bd 38 2c 46 bf 51 d9 15 41 aa 75 d1 d4 f4 fd |..8,F.Q..A.u....|
00000040 dd e8 8d 7e d7 3d f7 |...~.=.|
[aec 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[aed 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[aee 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[aef 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[af0 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[af1 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[af2 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[af3 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[af4 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[af5 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[af6 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[af7 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[af8 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960510 gate 1578074093574266200 evaluation starts
[af9 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960510 signed by 0 principal evaluation starts (used [false])
[afa 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960510 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[afb 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[afc 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[afd 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[afe 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960510 principal evaluation succeeds for identity 0
[aff 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003960510 gate 1578074093574266200 evaluation succeeds
[b00 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[b01 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[b02 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[b03 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[b04 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b05 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17855144128857206230 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[b06 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17855144128857206230 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[b07 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b08 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes
[b09 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b0a 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b0b 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b0c 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[b0d 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[b0e 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[b0f 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[b10 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[b11 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[b12 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[b13 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[b14 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b15 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979160 gate 1578074093579879100 evaluation starts
[b16 01-03 17:54:53.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979160 signed by 0 principal evaluation starts (used [false])
[b17 01-03 17:54:53.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979160 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[b18 01-03 17:54:53.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[b19 01-03 17:54:53.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979160 principal evaluation fails
[b1a 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979160 gate 1578074093579879100 evaluation fails
[b1b 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[b1c 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[b1d 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[b1e 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[b1f 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[b20 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b21 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979a60 gate 1578074093597372900 evaluation starts
[b22 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979a60 signed by 0 principal evaluation starts (used [false])
[b23 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979a60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[b24 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979a60 principal evaluation succeeds for identity 0
[b25 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003979a60 gate 1578074093597372900 evaluation succeeds
[b26 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[b27 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[b28 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[b29 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[b2a 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b2b 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[b2c 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[b2d 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[b2e 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[b2f 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[b30 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[b31 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[b32 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b33 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039947f0 gate 1578074093598547200 evaluation starts
[b34 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039947f0 signed by 0 principal evaluation starts (used [false])
[b35 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039947f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[b36 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039947f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[b37 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039947f0 principal evaluation fails
[b38 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039947f0 gate 1578074093598547200 evaluation fails
[b39 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[b3a 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[b3b 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[b3c 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[b3d 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[b3e 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b3f 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039950f0 gate 1578074093599260200 evaluation starts
[b40 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039950f0 signed by 0 principal evaluation starts (used [false])
[b41 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039950f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[b42 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039950f0 principal evaluation succeeds for identity 0
[b43 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039950f0 gate 1578074093599260200 evaluation succeeds
[b44 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[b45 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[b46 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[b47 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[b48 01-03 17:54:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b49 01-03 17:54:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[b4a 01-03 17:54:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b4b 01-03 17:54:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b4c 01-03 17:54:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b4d 01-03 17:54:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9570763437198483119 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[b4e 01-03 17:54:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9570763437198483119 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[b4f 01-03 17:54:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[b50 01-03 17:54:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b51 01-03 17:54:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074091764515900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[b52 01-03 17:54:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[b53 01-03 17:54:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[b54 01-03 17:54:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b55 01-03 17:54:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074091764515900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[b56 01-03 17:54:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074091764515900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[b57 01-03 17:54:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[b58 01-03 17:54:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[b59 01-03 17:54:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b5a 01-03 17:54:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b5b 01-03 17:54:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[b5c 01-03 17:54:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[b5d 01-03 17:54:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b5e 01-03 17:54:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b5f 01-03 17:54:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b60 01-03 17:54:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b61 01-03 17:54:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074092494861000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[b62 01-03 17:54:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074092494861000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[b63 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b64 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[b65 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[b66 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[b67 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[b68 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[b69 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[b6a 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[b6b 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[b6c 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b6d 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039caf90 gate 1578074094254111800 evaluation starts
[b6e 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039caf90 signed by 0 principal evaluation starts (used [false])
[b6f 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039caf90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[b70 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039caf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[b71 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039caf90 principal evaluation fails
[b72 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039caf90 gate 1578074094254111800 evaluation fails
[b73 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[b74 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[b75 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[b76 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[b77 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[b78 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b79 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb890 gate 1578074094259770500 evaluation starts
[b7a 01-03 17:54:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb890 signed by 0 principal evaluation starts (used [false])
[b7b 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb890 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[b7c 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb890 principal evaluation succeeds for identity 0
[b7d 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb890 gate 1578074094259770500 evaluation succeeds
[b7e 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[b7f 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[b80 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[b81 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[b82 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b83 01-03 17:54:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b84 01-03 17:54:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051
[b85 01-03 17:54:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13010304800944588003 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes to 1 peers
[b86 01-03 17:54:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051
[b87 01-03 17:54:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 1571398140282431546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes to 1 peers
[b89 01-03 17:54:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 1571398140282431546 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 50 bytes, Signature: 0 bytes
[b88 01-03 17:54:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13010304800944588003 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 51 bytes, Signature: 0 bytes
[b8a 01-03 17:54:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b8b 01-03 17:54:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b8c 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 1571398140282431546, Envelope: 956 bytes, Signature: 0 bytes
[b8d 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 1571398140282431546, Envelope: 956 bytes, Signature: 0 bytes
[b8e 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b8f 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[b90 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[b91 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[b92 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[b93 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[b94 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[b95 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......|
00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|
[b96 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 ae e7 d4 62 b3 16 ba df 4d 65 02 |0D. A...b....Me.|
00000010 ea c5 af ba df a3 5c 17 55 d1 8b aa 42 ee 6b 42 |......\.U...B.kB|
00000020 56 c5 33 de 02 20 49 8f 31 1a 5d 45 03 d8 9b fc |V.3.. I.1.]E....|
00000030 a7 a8 c0 a9 05 f3 c7 bc 41 eb 53 e7 e9 eb 1d 86 |........A.S.....|
00000040 ac 1c e1 41 93 95 |...A..|
[b97 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b98 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7610 gate 1578074094285748900 evaluation starts
[b99 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7610 signed by 0 principal evaluation starts (used [false])
[b9a 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7610 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[b9b 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[b9c 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7610 principal evaluation fails
[b9d 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7610 gate 1578074094285748900 evaluation fails
[b9e 01-03 17:54:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[b9f 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[ba0 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[ba1 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......|
00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|
[ba2 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 ae e7 d4 62 b3 16 ba df 4d 65 02 |0D. A...b....Me.|
00000010 ea c5 af ba df a3 5c 17 55 d1 8b aa 42 ee 6b 42 |......\.U...B.kB|
00000020 56 c5 33 de 02 20 49 8f 31 1a 5d 45 03 d8 9b fc |V.3.. I.1.]E....|
00000030 a7 a8 c0 a9 05 f3 c7 bc 41 eb 53 e7 e9 eb 1d 86 |........A.S.....|
00000040 ac 1c e1 41 93 95 |...A..|
[ba3 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ba4 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7f10 gate 1578074094291878700 evaluation starts
[ba5 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7f10 signed by 0 principal evaluation starts (used [false])
[ba6 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7f10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[ba7 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7f10 principal evaluation succeeds for identity 0
[ba8 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7f10 gate 1578074094291878700 evaluation succeeds
[ba9 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[baa 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[bab 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[bac 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[bad 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bae 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074092494861000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[baf 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[bb0 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 1571398140282431546, Envelope: 956 bytes, Signature: 0 bytes
[bb1 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bb2 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[bb3 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bb4 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[bb5 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]
[bb6 01-03 17:54:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added <20>?Y;.<2E>ZW<5A>m<EFBFBD>~<7E><><EFBFBD><EFBFBD><6D>ܮ@S<>^u<> to the in memory item map, total items: 3
[bb7 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bb8 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074092494861000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[bb9 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bba 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[bbb 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[bbc 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[bbd 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[bbe 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[bbf 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[bc0 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[bc1 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[bc2 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[bc3 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a320e0 gate 1578074094309410300 evaluation starts
[bc4 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a320e0 signed by 0 principal evaluation starts (used [false])
[bc5 01-03 17:54:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a320e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[bc6 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a320e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[bc7 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a320e0 principal evaluation fails
[bc8 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a320e0 gate 1578074094309410300 evaluation fails
[bc9 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[bca 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[bcb 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[bcc 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[bcd 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[bce 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[bcf 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a329e0 gate 1578074094312669300 evaluation starts
[bd0 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a329e0 signed by 0 principal evaluation starts (used [false])
[bd1 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a329e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[bd2 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a329e0 principal evaluation succeeds for identity 0
[bd3 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a329e0 gate 1578074094312669300 evaluation succeeds
[bd4 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[bd5 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[bd6 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[bd7 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[bd8 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bd9 01-03 17:54:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bda 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13010304800944588003, Envelope: 958 bytes, Signature: 0 bytes
[bdb 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13010304800944588003, Envelope: 958 bytes, Signature: 0 bytes
[bdc 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bdd 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[bde 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[bdf 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[be0 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[be1 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[be2 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[be3 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!|
00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|
[be4 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 20 e7 9a be c7 b8 4b 08 4e e3 |0E.!.. .....K.N.|
00000010 d8 f5 87 8c 49 c8 1a a6 ca 98 78 fe 34 5f 8c 4e |....I.....x.4_.N|
00000020 2a 5b 1e 35 d4 02 20 61 23 de 73 1b 8d ca 29 98 |*[.5.. a#.s...).|
00000030 ff bd 65 69 2b ae a6 ac e4 39 e1 2b 9b fe 4a 14 |..ei+....9.+..J.|
00000040 36 1a cc de ce 0f 10 |6......|
[be5 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[be6 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a46760 gate 1578074094392489400 evaluation starts
[be7 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a46760 signed by 0 principal evaluation starts (used [false])
[be8 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a46760 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[be9 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a46760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[bea 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a46760 principal evaluation fails
[beb 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a46760 gate 1578074094392489400 evaluation fails
[bec 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[bed 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[bee 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[bef 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!|
00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|
[bf0 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 20 e7 9a be c7 b8 4b 08 4e e3 |0E.!.. .....K.N.|
00000010 d8 f5 87 8c 49 c8 1a a6 ca 98 78 fe 34 5f 8c 4e |....I.....x.4_.N|
00000020 2a 5b 1e 35 d4 02 20 61 23 de 73 1b 8d ca 29 98 |*[.5.. a#.s...).|
00000030 ff bd 65 69 2b ae a6 ac e4 39 e1 2b 9b fe 4a 14 |..ei+....9.+..J.|
00000040 36 1a cc de ce 0f 10 |6......|
[bf1 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[bf2 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a47060 gate 1578074094394071200 evaluation starts
[bf3 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a47060 signed by 0 principal evaluation starts (used [false])
[bf4 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a47060 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[bf5 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a47060 principal evaluation succeeds for identity 0
[bf6 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a47060 gate 1578074094394071200 evaluation succeeds
[bf7 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[bf8 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[bf9 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[bfa 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[bfb 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bfc 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[bfd 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13010304800944588003, Envelope: 958 bytes, Signature: 0 bytes
[bfe 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bff 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[c00 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c01 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[c02 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]
[c03 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Added ̣P<CCA3><50>S<EFBFBD><53>WtK̺<4B><CCBA><EFBFBD><EFBFBD>M6a<36>s)<13><><1A> 0 to the in memory item map, total items: 4
[c04 01-03 17:54:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c05 01-03 17:54:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[c06 01-03 17:54:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[c07 01-03 17:54:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c08 01-03 17:54:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c09 01-03 17:54:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c0a 01-03 17:54:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c0b 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074092877459900 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[c0c 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074092877459900 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes
[c0d 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c0e 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[c0f 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[c10 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[c11 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[c12 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[c13 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[c14 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[c15 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[c16 01-03 17:54:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[c17 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fcb0 gate 1578074094510245100 evaluation starts
[c18 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fcb0 signed by 0 principal evaluation starts (used [false])
[c19 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fcb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[c1a 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[c1b 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fcb0 principal evaluation fails
[c1c 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fcb0 gate 1578074094510245100 evaluation fails
[c1d 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[c1e 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[c1f 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[c20 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[c21 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[c22 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[c23 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a905b0 gate 1578074094512296600 evaluation starts
[c24 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a905b0 signed by 0 principal evaluation starts (used [false])
[c25 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a905b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[c26 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a905b0 principal evaluation succeeds for identity 0
[c27 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a905b0 gate 1578074094512296600 evaluation succeeds
[c28 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[c29 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[c2a 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[c2b 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[c2c 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c2d 01-03 17:54:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c2e 01-03 17:54:55.51 UTC] [%{longpkg}] %{callpath} -> INFO [[businesschannel] Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]]
[c2f 01-03 17:54:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:14238728984539080599 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[c30 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14238728984539080599 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[c31 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[c32 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c33 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[c34 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c35 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[c36 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[c37 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 8d 50 6d 34 e2 63 79 57 81 d6 fe 67 96 9b f2 |..Pm4.cyW...g...|
00000010 6d 29 6d f0 ff 7b 60 9f 81 bd 1d 05 7a 30 65 57 |m)m..{`.....z0eW|
[c38 01-03 17:54:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d bc ed f9 b8 17 ca f3 dd a4 ad f7 |0D. ............|
00000010 de 36 f1 ea da 37 8f a8 77 64 f7 85 4b ce 29 5f |.6...7..wd..K.)_|
00000020 a9 e9 c6 14 02 20 35 fa 22 fd ac 9c cb ed 29 50 |..... 5.".....)P|
00000030 b4 0b c2 17 57 83 96 0e 31 4f d6 16 c8 87 2e 9b |....W...1O......|
00000040 93 37 27 b7 a0 63 |.7'..c|
[c39 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[c3a 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 2e 53 7d c3 48 c6 53 d2 f5 f8 fb |0D. ..S}.H.S....|
00000010 08 54 04 01 70 f2 a7 6c c7 ac 61 5e a0 99 1d d2 |.T..p..l..a^....|
00000020 18 d3 a9 31 02 20 19 34 1c f2 a2 ad 21 22 e7 16 |...1. .4....!"..|
00000030 47 c6 de 67 34 e2 e7 be 29 60 cc 06 ad ed 16 72 |G..g4...)`.....r|
00000040 1c fe 69 f3 64 09 |..i.d.|
[c3b 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[c3c 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[c3d 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:23
[c3e 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:23
[c3f 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[c40 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c41 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c42 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c43 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[c44 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c45 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c46 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[c47 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[c48 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[c49 01-03 17:54:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c4a 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[c4b 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[c4c 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510031801
[c4d 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0DD8FCC9655D2C4B1E875BBE1D418FDCBBD43F1053F5BFC5BE2BB57DF30F9ABB
[c4e 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[c4f 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c50 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c51 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c52 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c53 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[c54 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c55 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c56 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[c57 01-03 17:54:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c58 01-03 17:54:56.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57482
[c59 01-03 17:54:56.59 UTC] [%{longpkg}] %{callpath} -> DEBU 04389aafea42ef3b4c4f104984ad6ccd78921cd3bfcd127a39baab9b5728a2fd creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[c5a 01-03 17:54:56.59 UTC] [%{longpkg}] %{callpath} -> DEBU 04389aafea42ef3b4c4f104984ad6ccd78921cd3bfcd127a39baab9b5728a2fd creator is valid
[c5b 01-03 17:54:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 a5 38 e9 d5 df 24 0e 16 1f fc 85 53 dc b2 e5 |..8...$.....S...|
00000010 40 aa 02 19 0c 0e f5 58 42 02 1e 85 2e 81 c3 e6 |@......XB.......|
[c5c 01-03 17:54:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d cd 0f 75 cd 10 85 b7 4c db 39 2b |0D. -..u....L.9+|
00000010 54 f5 01 c4 e7 62 01 5f 4d 04 2f 39 dc ea 90 e9 |T....b._M./9....|
00000020 bb fd bb c8 02 20 04 f5 4d 00 4e 81 4e 4b 63 aa |..... ..M.N.NKc.|
00000030 fb 64 39 59 75 3b a9 a2 0a a4 61 cb 26 06 a0 a0 |.d9Yu;....a.&...|
00000040 eb f3 b8 40 10 ee |...@..|
[c5d 01-03 17:54:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 04389aafea42ef3b4c4f104984ad6ccd78921cd3bfcd127a39baab9b5728a2fd signature is valid
[c5e 01-03 17:54:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU [][04389aaf] processing txid: 04389aafea42ef3b4c4f104984ad6ccd78921cd3bfcd127a39baab9b5728a2fd
[c5f 01-03 17:54:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU [][04389aaf] Entry chaincode: _lifecycle
[c60 01-03 17:54:56.60 UTC] [%{longpkg}] %{callpath} -> INFO [][04389aaf] Entry chaincode: _lifecycle
[c61 01-03 17:54:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU [04389aaf] getting chaincode data for _lifecycle on channel
[c62 01-03 17:54:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[c63 01-03 17:54:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 a5 38 e9 d5 df 24 0e 16 1f fc 85 53 dc b2 e5 |..8...$.....S...|
00000010 40 aa 02 19 0c 0e f5 58 42 02 1e 85 2e 81 c3 e6 |@......XB.......|
[c64 01-03 17:54:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d cd 0f 75 cd 10 85 b7 4c db 39 2b |0D. -..u....L.9+|
00000010 54 f5 01 c4 e7 62 01 5f 4d 04 2f 39 dc ea 90 e9 |T....b._M./9....|
00000020 bb fd bb c8 02 20 04 f5 4d 00 4e 81 4e 4b 63 aa |..... ..M.N.NKc.|
00000030 fb 64 39 59 75 3b a9 a2 0a a4 61 cb 26 06 a0 a0 |.d9Yu;....a.&...|
00000040 eb f3 b8 40 10 ee |...@..|
[c65 01-03 17:54:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of InstallChaincode for install package 1f8b08000000000000ffecb565505cd1f72d887b02c1090e21b886407097a081e01a9c...
[c66 01-03 17:54:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar
[c67 01-03 17:54:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU
FROM hyperledger/fabric-baseos:2.0.0
ADD binpackage.tar /usr/local/bin
LABEL org.hyperledger.fabric.chaincode.type="GOLANG" \
org.hyperledger.fabric.version="2.0.0"
ENV CORE_CHAINCODE_BUILDLEVEL=2.0.0
[c68 01-03 17:54:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:2.0.0
[c69 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 14238728984539080599 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes
[c6a 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 14238728984539080599 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes
[c6b 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c6c 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[c6d 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[c6e 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c6f 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[c70 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[c71 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 5d c7 87 52 f5 61 6e d0 a6 15 ed b9 54 82 18 |m]..R.an.....T..|
00000010 79 e1 e8 45 27 ed 6b c4 c7 7a 6a b1 2d fb aa 88 |y..E'.k..zj.-...|
[c72 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 85 a6 5a 17 25 29 0b f5 ec a1 c3 |0D. ...Z.%).....|
00000010 8a 1c 6e fe 11 31 f9 5a fe e7 45 ab 68 83 bc d4 |..n..1.Z..E.h...|
00000020 b5 a9 22 fc 02 20 4c f1 42 cb ed 49 9e fd 36 37 |..".. L.B..I..67|
00000030 46 58 63 c6 74 0b c5 2f e4 17 46 71 c0 61 15 43 |FXc.t../..Fq.a.C|
00000040 63 ab 19 28 c9 60 |c..(.`|
[c73 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[c74 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 93 a7 31 6a 03 9f 03 22 62 65 |0E.!....1j..."be|
00000010 77 20 03 c9 17 bc b9 7c d0 fa c4 24 3b 15 bf 85 |w .....|...$;...|
00000020 cd a6 b9 25 17 02 20 1f ad 9c ab a5 61 db 6c c1 |...%.. .....a.l.|
00000030 4f 7e dc 8b 8b bf bf a6 0e 2e c2 f6 63 64 7e f3 |O~..........cd~.|
00000040 50 eb 6a 77 18 1f 0e |P.jw...|
[c75 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[c76 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[c77 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24
[c78 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24
[c79 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[c7a 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c7b 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c7c 01-03 17:54:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c7d 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c7e 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c7f 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c80 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[c81 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c82 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[c83 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[c84 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c85 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[c86 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c87 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[c88 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[c89 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c8a 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[c8b 01-03 17:54:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c8c 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:580298987227827264 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[c8d 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:580298987227827264 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[c8e 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:580298987227827264 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[c8f 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c90 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c91 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c92 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c93 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c94 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c95 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[c96 01-03 17:54:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c97 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[c98 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[c99 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c9a 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[c9b 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[c9c 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c9d 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[c9e 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[c9f 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[ca0 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[ca1 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[ca2 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[ca3 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 08 ec a3 32 7f 30 20 66 27 79 37 0a 0a 11 ea |....2.0 f'y7....|
00000010 3b d1 33 46 19 ff b9 b2 fc a1 28 95 e4 96 46 3c |;.3F......(...F<|
[ca4 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb f9 f8 ca 45 24 2c 47 1e cb 00 |0E.!.....E$,G...|
00000010 47 50 20 08 ff b7 a5 21 ad 3f 9e 62 8c 35 32 af |GP ....!.?.b.52.|
00000020 59 d5 f6 94 ae 02 20 0d 8f 11 76 af 1b 5c 62 f7 |Y..... ...v..\b.|
00000030 38 b3 aa 08 d2 f8 67 4b 8c 4b 9f 34 6b ba 08 c9 |8.....gK.K.4k...|
00000040 81 9f 51 5a 80 df 2d |..QZ..-|
[ca5 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ca6 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002136d0 gate 1578074097034806000 evaluation starts
[ca7 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002136d0 signed by 0 principal evaluation starts (used [false])
[ca8 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002136d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[ca9 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002136d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[caa 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002136d0 principal evaluation fails
[cab 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002136d0 gate 1578074097034806000 evaluation fails
[cac 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[cad 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[cae 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[caf 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 08 ec a3 32 7f 30 20 66 27 79 37 0a 0a 11 ea |....2.0 f'y7....|
00000010 3b d1 33 46 19 ff b9 b2 fc a1 28 95 e4 96 46 3c |;.3F......(...F<|
[cb0 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb f9 f8 ca 45 24 2c 47 1e cb 00 |0E.!.....E$,G...|
00000010 47 50 20 08 ff b7 a5 21 ad 3f 9e 62 8c 35 32 af |GP ....!.?.b.52.|
00000020 59 d5 f6 94 ae 02 20 0d 8f 11 76 af 1b 5c 62 f7 |Y..... ...v..\b.|
00000030 38 b3 aa 08 d2 f8 67 4b 8c 4b 9f 34 6b ba 08 c9 |8.....gK.K.4k...|
00000040 81 9f 51 5a 80 df 2d |..QZ..-|
[cb1 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[cb2 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232130 gate 1578074097035214100 evaluation starts
[cb3 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232130 signed by 0 principal evaluation starts (used [false])
[cb4 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232130 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[cb5 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232130 principal evaluation succeeds for identity 0
[cb6 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232130 gate 1578074097035214100 evaluation succeeds
[cb7 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[cb8 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[cb9 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[cba 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[cbb 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[cbc 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes]}
[cbd 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21
[cbe 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21
[cbf 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[cc0 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[cc1 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[cc2 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[cc3 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[cc4 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cc5 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cc6 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cc7 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[cc8 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[cc9 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[cca 01-03 17:54:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ccb 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:11699835694894666340 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[ccc 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:11699835694894666340 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[ccd 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11699835694894666340 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[cce 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ccf 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cd0 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cd1 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cd2 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cd3 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cd4 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[cd5 01-03 17:54:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[cd6 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[cd7 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[cd8 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[cd9 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[cda 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[cdb 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cdc 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[cdd 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[cde 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[cdf 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[ce0 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[ce1 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[ce2 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 36 d8 de 19 95 9a 66 d3 68 0a 61 7b 22 82 9d |&6.....f.h.a{"..|
00000010 ee d5 94 b5 d7 e2 e1 9e 13 35 50 6f 70 92 15 eb |.........5Pop...|
[ce3 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 1a 28 ea 7e 16 e4 a3 95 26 a8 90 |0D. >.(.~....&..|
00000010 5a 73 b4 83 1d 34 a4 8e f5 09 8e f4 6d 92 10 34 |Zs...4......m..4|
00000020 65 1c 02 2f 02 20 4b ec ab fc 5a 55 40 0f ad 1c |e../. K...ZU@...|
00000030 8b 3e 11 be cc 5c fb 89 19 55 f4 34 af 4a fc b7 |.>...\...U.4.J..|
00000040 fb e3 b7 d5 2d bb |....-.|
[ce4 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ce5 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278e90 gate 1578074097068222300 evaluation starts
[ce6 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278e90 signed by 0 principal evaluation starts (used [false])
[ce7 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278e90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[ce8 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[ce9 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278e90 principal evaluation fails
[cea 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278e90 gate 1578074097068222300 evaluation fails
[ceb 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[cec 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[ced 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[cee 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 36 d8 de 19 95 9a 66 d3 68 0a 61 7b 22 82 9d |&6.....f.h.a{"..|
00000010 ee d5 94 b5 d7 e2 e1 9e 13 35 50 6f 70 92 15 eb |.........5Pop...|
[cef 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 1a 28 ea 7e 16 e4 a3 95 26 a8 90 |0D. >.(.~....&..|
00000010 5a 73 b4 83 1d 34 a4 8e f5 09 8e f4 6d 92 10 34 |Zs...4......m..4|
00000020 65 1c 02 2f 02 20 4b ec ab fc 5a 55 40 0f ad 1c |e../. K...ZU@...|
00000030 8b 3e 11 be cc 5c fb 89 19 55 f4 34 af 4a fc b7 |.>...\...U.4.J..|
00000040 fb e3 b7 d5 2d bb |....-.|
[cf0 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[cf1 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279820 gate 1578074097068740700 evaluation starts
[cf2 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279820 signed by 0 principal evaluation starts (used [false])
[cf3 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279820 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[cf4 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279820 principal evaluation succeeds for identity 0
[cf5 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279820 gate 1578074097068740700 evaluation succeeds
[cf6 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[cf7 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[cf8 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[cf9 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[cfa 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes
[cfb 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}
[cfc 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23
[cfd 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23
[cfe 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[cff 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d00 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d01 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d02 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[d03 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d04 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d05 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d06 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[d07 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[d08 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[d09 01-03 17:54:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d0a 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[d0b 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1520940125138338646 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[d0c 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[d0d 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8752801184726795384 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[d0e 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[d0f 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17894369912458616106 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[d10 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17894369912458616106 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[d11 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d12 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1520940125138338646 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[d13 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d14 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8752801184726795384 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[d15 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d16 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1520940125138338646 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[d17 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1520940125138338646 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[d18 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d19 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17894369912458616106 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes
[d1a 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17894369912458616106 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes
[d1b 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17894369912458616106 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes
[d1c 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d1d 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8752801184726795384 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[d1e 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8752801184726795384 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[d1f 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8752801184726795384 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[d20 01-03 17:54:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d21 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151014
[d22 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0B2E69989E48F4847AA5CB9B92299B0A81A9D1C558CCD539C2951E971CA0A8D7
[d23 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[d24 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[d25 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d26 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[d27 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[d28 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d29 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[d2a 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[d2b 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d2c 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[d2d 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d2e 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[d2f 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d30 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[d31 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[d32 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d33 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[d34 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[d35 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d36 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[d37 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[d38 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[d39 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[d3a 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[d3b 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[d3c 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 36 d8 de 19 95 9a 66 d3 68 0a 61 7b 22 82 9d |&6.....f.h.a{"..|
00000010 ee d5 94 b5 d7 e2 e1 9e 13 35 50 6f 70 92 15 eb |.........5Pop...|
[d3d 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 1a 28 ea 7e 16 e4 a3 95 26 a8 90 |0D. >.(.~....&..|
00000010 5a 73 b4 83 1d 34 a4 8e f5 09 8e f4 6d 92 10 34 |Zs...4......m..4|
00000020 65 1c 02 2f 02 20 4b ec ab fc 5a 55 40 0f ad 1c |e../. K...ZU@...|
00000030 8b 3e 11 be cc 5c fb 89 19 55 f4 34 af 4a fc b7 |.>...\...U.4.J..|
00000040 fb e3 b7 d5 2d bb |....-.|
[d3e 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d3f 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d010 gate 1578074097298971900 evaluation starts
[d40 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d010 signed by 0 principal evaluation starts (used [false])
[d41 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d010 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[d42 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[d43 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d010 principal evaluation fails
[d44 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d010 gate 1578074097298971900 evaluation fails
[d45 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[d46 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[d47 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[d48 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 36 d8 de 19 95 9a 66 d3 68 0a 61 7b 22 82 9d |&6.....f.h.a{"..|
00000010 ee d5 94 b5 d7 e2 e1 9e 13 35 50 6f 70 92 15 eb |.........5Pop...|
[d49 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 1a 28 ea 7e 16 e4 a3 95 26 a8 90 |0D. >.(.~....&..|
00000010 5a 73 b4 83 1d 34 a4 8e f5 09 8e f4 6d 92 10 34 |Zs...4......m..4|
00000020 65 1c 02 2f 02 20 4b ec ab fc 5a 55 40 0f ad 1c |e../. K...ZU@...|
00000030 8b 3e 11 be cc 5c fb 89 19 55 f4 34 af 4a fc b7 |.>...\...U.4.J..|
00000040 fb e3 b7 d5 2d bb |....-.|
[d4a 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d4b 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035db00 gate 1578074097299380700 evaluation starts
[d4c 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035db00 signed by 0 principal evaluation starts (used [false])
[d4d 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035db00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[d4e 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035db00 principal evaluation succeeds for identity 0
[d4f 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035db00 gate 1578074097299380700 evaluation succeeds
[d50 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[d51 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[d52 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[d53 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[d54 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes
[d55 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d56 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[d57 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 2e 69 98 9e 48 f4 84 7a a5 cb 9b 92 29 9b 0a |..i..H..z....)..|
00000010 81 a9 d1 c5 58 cc d5 39 c2 95 1e 97 1c a0 a8 d7 |....X..9........|
[d58 01-03 17:54:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b be 97 39 2b 2f be 31 a8 ba 46 43 |0D. ;..9+/.1..FC|
00000010 a4 4b 7f 25 ae c4 62 66 5a 06 f3 9b d3 f8 83 7f |.K.%..bfZ.......|
00000020 d4 f1 b2 77 02 20 6f e3 a7 79 db 7a 95 08 33 d6 |...w. o..y.z..3.|
00000030 61 99 da bb 89 82 1d 50 d7 5d c3 6c d4 c6 46 db |a......P.].l..F.|
00000040 69 e7 67 f4 89 ae |i.g...|
[d59 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[d5a 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[d5b 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d5c 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d5d 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes
[d5e 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes
[d5f 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d60 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes
[d61 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[d62 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 2e 69 98 9e 48 f4 84 7a a5 cb 9b 92 29 9b 0a |..i..H..z....)..|
00000010 81 a9 d1 c5 58 cc d5 39 c2 95 1e 97 1c a0 a8 d7 |....X..9........|
[d63 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b be 97 39 2b 2f be 31 a8 ba 46 43 |0D. ;..9+/.1..FC|
00000010 a4 4b 7f 25 ae c4 62 66 5a 06 f3 9b d3 f8 83 7f |.K.%..bfZ.......|
00000020 d4 f1 b2 77 02 20 6f e3 a7 79 db 7a 95 08 33 d6 |...w. o..y.z..3.|
00000030 61 99 da bb 89 82 1d 50 d7 5d c3 6c d4 c6 46 db |a......P.].l..F.|
00000040 69 e7 67 f4 89 ae |i.g...|
[d64 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[d65 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[d66 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d67 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[d68 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d69 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[d6a 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[d6b 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[d6c 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[d6d 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[d6e 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[d6f 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 08 ec a3 32 7f 30 20 66 27 79 37 0a 0a 11 ea |....2.0 f'y7....|
00000010 3b d1 33 46 19 ff b9 b2 fc a1 28 95 e4 96 46 3c |;.3F......(...F<|
[d70 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb f9 f8 ca 45 24 2c 47 1e cb 00 |0E.!.....E$,G...|
00000010 47 50 20 08 ff b7 a5 21 ad 3f 9e 62 8c 35 32 af |GP ....!.?.b.52.|
00000020 59 d5 f6 94 ae 02 20 0d 8f 11 76 af 1b 5c 62 f7 |Y..... ...v..\b.|
00000030 38 b3 aa 08 d2 f8 67 4b 8c 4b 9f 34 6b ba 08 c9 |8.....gK.K.4k...|
00000040 81 9f 51 5a 80 df 2d |..QZ..-|
[d71 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d72 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f1c0 gate 1578074097306266600 evaluation starts
[d73 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f1c0 signed by 0 principal evaluation starts (used [false])
[d74 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f1c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[d75 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[d76 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[d77 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f1c0 principal evaluation fails
[d78 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f1c0 gate 1578074097306266600 evaluation fails
[d79 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[d7a 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[d7b 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[d7c 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 08 ec a3 32 7f 30 20 66 27 79 37 0a 0a 11 ea |....2.0 f'y7....|
00000010 3b d1 33 46 19 ff b9 b2 fc a1 28 95 e4 96 46 3c |;.3F......(...F<|
[d7d 01-03 17:54:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb f9 f8 ca 45 24 2c 47 1e cb 00 |0E.!.....E$,G...|
00000010 47 50 20 08 ff b7 a5 21 ad 3f 9e 62 8c 35 32 af |GP ....!.?.b.52.|
00000020 59 d5 f6 94 ae 02 20 0d 8f 11 76 af 1b 5c 62 f7 |Y..... ...v..\b.|
00000030 38 b3 aa 08 d2 f8 67 4b 8c 4b 9f 34 6b ba 08 c9 |8.....gK.K.4k...|
00000040 81 9f 51 5a 80 df 2d |..QZ..-|
[d7e 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d7f 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087fbd0 gate 1578074097311423100 evaluation starts
[d80 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087fbd0 signed by 0 principal evaluation starts (used [false])
[d81 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087fbd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[d82 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087fbd0 principal evaluation succeeds for identity 0
[d83 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087fbd0 gate 1578074097311423100 evaluation succeeds
[d84 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[d85 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[d86 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[d87 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[d88 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[d89 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d8a 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[d8b 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d8c 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[d8d 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[d8e 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[d8f 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[d90 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[d91 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[d92 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3d a7 bc 9b 97 e5 2d ab 9c 27 3b f1 68 3f 11 |/=.....-..';.h?.|
00000010 30 49 89 7b fe 5d 71 94 4a a4 ee 3e ce dd 9a 54 |0I.{.]q.J..>...T|
[d93 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 2f f0 32 a8 36 24 e7 bd 25 0f 39 |0D. 9/.2.6$..%.9|
00000010 b3 84 1b d4 c3 1b b4 7c 4d 84 a2 7f bd e0 8e f4 |.......|M.......|
00000020 8e b6 90 73 02 20 73 3a 17 3e 43 0a 8a 4b 30 36 |...s. s:.>C..K06|
00000030 17 d9 40 53 76 2f 55 94 da ba 4d ec d0 23 ff 27 |..@Sv/U...M..#.'|
00000040 b3 ff a5 33 30 8e |...30.|
[d94 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d95 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d910 gate 1578074097317768500 evaluation starts
[d96 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d910 signed by 0 principal evaluation starts (used [false])
[d97 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d910 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[d98 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[d99 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d910 principal evaluation fails
[d9a 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d910 gate 1578074097317768500 evaluation fails
[d9b 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[d9c 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[d9d 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[d9e 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3d a7 bc 9b 97 e5 2d ab 9c 27 3b f1 68 3f 11 |/=.....-..';.h?.|
00000010 30 49 89 7b fe 5d 71 94 4a a4 ee 3e ce dd 9a 54 |0I.{.]q.J..>...T|
[d9f 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 2f f0 32 a8 36 24 e7 bd 25 0f 39 |0D. 9/.2.6$..%.9|
00000010 b3 84 1b d4 c3 1b b4 7c 4d 84 a2 7f bd e0 8e f4 |.......|M.......|
00000020 8e b6 90 73 02 20 73 3a 17 3e 43 0a 8a 4b 30 36 |...s. s:.>C..K06|
00000030 17 d9 40 53 76 2f 55 94 da ba 4d ec d0 23 ff 27 |..@Sv/U...M..#.'|
00000040 b3 ff a5 33 30 8e |...30.|
[da0 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[da1 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246310 gate 1578074097319390700 evaluation starts
[da2 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246310 signed by 0 principal evaluation starts (used [false])
[da3 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246310 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[da4 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246310 principal evaluation succeeds for identity 0
[da5 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246310 gate 1578074097319390700 evaluation succeeds
[da6 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[da7 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[da8 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[da9 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[daa 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[dab 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1578074073067386200, 23 but got ts: inc_num:1578074073067386200 seq_num:21
[dac 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dad 01-03 17:54:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dae 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[daf 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[db0 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[db1 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 2e 69 98 9e 48 f4 84 7a a5 cb 9b 92 29 9b 0a |..i..H..z....)..|
00000010 81 a9 d1 c5 58 cc d5 39 c2 95 1e 97 1c a0 a8 d7 |....X..9........|
[db2 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b be 97 39 2b 2f be 31 a8 ba 46 43 |0D. ;..9+/.1..FC|
00000010 a4 4b 7f 25 ae c4 62 66 5a 06 f3 9b d3 f8 83 7f |.K.%..bfZ.......|
00000020 d4 f1 b2 77 02 20 6f e3 a7 79 db 7a 95 08 33 d6 |...w. o..y.z..3.|
00000030 61 99 da bb 89 82 1d 50 d7 5d c3 6c d4 c6 46 db |a......P.].l..F.|
00000040 69 e7 67 f4 89 ae |i.g...|
[db3 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[db4 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b c7 27 03 79 a0 1f 67 ae 54 f4 19 |0D. ..'.y..g.T..|
00000010 dc d8 21 b0 b5 6a 33 0a e1 fe e4 3b d3 9f 71 23 |..!..j3....;..q#|
00000020 2c 4f 32 b2 02 20 36 79 49 ec 73 c1 52 3d 7d e7 |,O2.. 6yI.s.R=}.|
00000030 55 6d 92 70 c9 36 f8 2e 68 8e 27 1b a6 e1 36 c4 |Um.p.6..h.'...6.|
00000040 3f fb b9 c8 9e e5 |?.....|
[db5 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[db6 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[db7 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[db8 01-03 17:54:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[db9 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dba 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dbb 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[dbc 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[dbd 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dbe 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[dbf 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dc0 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[dc1 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dc2 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes
[dc3 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes
[dc4 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dc5 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dc6 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[dc7 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dc8 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[dc9 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[dca 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[dcb 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[dcc 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[dcd 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[dce 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[dcf 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[dd0 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[dd1 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86460 gate 1578074097513948500 evaluation starts
[dd2 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86460 signed by 0 principal evaluation starts (used [false])
[dd3 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86460 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[dd4 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[dd5 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86460 principal evaluation fails
[dd6 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86460 gate 1578074097513948500 evaluation fails
[dd7 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[dd8 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[dd9 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[dda 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[ddb 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[ddc 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ddd 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86d60 gate 1578074097514431300 evaluation starts
[dde 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86d60 signed by 0 principal evaluation starts (used [false])
[ddf 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86d60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[de0 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86d60 principal evaluation succeeds for identity 0
[de1 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c86d60 gate 1578074097514431300 evaluation succeeds
[de2 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[de3 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[de4 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[de5 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[de6 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[de7 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[de8 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[de9 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dea 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[deb 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[dec 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[ded 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[dee 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[def 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[df0 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[df1 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[df2 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[df3 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdced0 gate 1578074097516181900 evaluation starts
[df4 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdced0 signed by 0 principal evaluation starts (used [false])
[df5 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdced0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[df6 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[df7 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdced0 principal evaluation fails
[df8 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdced0 gate 1578074097516181900 evaluation fails
[df9 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[dfa 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[dfb 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[dfc 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[dfd 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[dfe 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[dff 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdd7d0 gate 1578074097516701600 evaluation starts
[e00 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdd7d0 signed by 0 principal evaluation starts (used [false])
[e01 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdd7d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[e02 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdd7d0 principal evaluation succeeds for identity 0
[e03 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdd7d0 gate 1578074097516701600 evaluation succeeds
[e04 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[e05 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[e06 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[e07 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[e08 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e09 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[e0a 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e0b 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e0c 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e0d 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[e0e 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[e0f 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[e10 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[e11 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[e12 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[e13 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[e14 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[e15 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e16 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d136e0 gate 1578074097517704600 evaluation starts
[e17 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d136e0 signed by 0 principal evaluation starts (used [false])
[e18 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d136e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[e19 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d136e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[e1a 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d136e0 principal evaluation fails
[e1b 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d136e0 gate 1578074097517704600 evaluation fails
[e1c 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[e1d 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[e1e 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[e1f 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[e20 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[e21 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e22 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e1a0 gate 1578074097518239900 evaluation starts
[e23 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e1a0 signed by 0 principal evaluation starts (used [false])
[e24 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e1a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[e25 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e1a0 principal evaluation succeeds for identity 0
[e26 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e1a0 gate 1578074097518239900 evaluation succeeds
[e27 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[e28 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[e29 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[e2a 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[e2b 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[e2c 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[e2d 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[e2e 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[e2f 01-03 17:54:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e30 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e31 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[e32 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[e33 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[e34 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[e35 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[e36 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[e37 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[e38 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[e39 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e3a 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9ea00 gate 1578074097520652500 evaluation starts
[e3b 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9ea00 signed by 0 principal evaluation starts (used [false])
[e3c 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9ea00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[e3d 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9ea00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[e3e 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9ea00 principal evaluation fails
[e3f 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9ea00 gate 1578074097520652500 evaluation fails
[e40 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[e41 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[e42 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[e43 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[e44 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[e45 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e46 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9f300 gate 1578074097521477000 evaluation starts
[e47 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9f300 signed by 0 principal evaluation starts (used [false])
[e48 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9f300 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[e49 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9f300 principal evaluation succeeds for identity 0
[e4a 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9f300 gate 1578074097521477000 evaluation succeeds
[e4b 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[e4c 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[e4d 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[e4e 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[e4f 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e50 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes
[e51 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[e52 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[e53 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e54 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e55 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[e56 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[e57 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[e58 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e59 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e5a 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e5b 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e5c 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18162770100965853124 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[e5d 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[e5e 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18162770100965853124 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[e5f 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[e60 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e61 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[e62 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[e63 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[e64 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[e65 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[e66 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[e67 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e68 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11d10 gate 1578074097524781800 evaluation starts
[e69 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11d10 signed by 0 principal evaluation starts (used [false])
[e6a 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11d10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[e6b 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[e6c 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11d10 principal evaluation fails
[e6d 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e11d10 gate 1578074097524781800 evaluation fails
[e6e 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[e6f 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[e70 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[e71 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[e72 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[e73 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e74 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3c610 gate 1578074097525447100 evaluation starts
[e75 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3c610 signed by 0 principal evaluation starts (used [false])
[e76 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3c610 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[e77 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3c610 principal evaluation succeeds for identity 0
[e78 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3c610 gate 1578074097525447100 evaluation succeeds
[e79 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[e7a 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[e7b 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[e7c 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[e7d 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e7e 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18162770100965853124 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[e7f 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18162770100965853124 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[e80 01-03 17:54:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e81 01-03 17:54:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[e82 01-03 17:54:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e83 01-03 17:54:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e84 01-03 17:54:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e85 01-03 17:54:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5014465361485120431 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[e86 01-03 17:54:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5014465361485120431 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[e87 01-03 17:54:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[e88 01-03 17:54:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e89 01-03 17:54:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[e8a 01-03 17:54:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[e8b 01-03 17:54:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[e8c 01-03 17:54:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e8d 01-03 17:54:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[e8e 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e8f 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[e90 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[e91 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[e92 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[e93 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[e94 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 11699835694894666340 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes
[e95 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[e97 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 8a 8d a2 05 fa 69 ca 89 bb 56 72 01 72 b7 7d |......i...Vr.r.}|
00000010 57 47 6f 49 8e cb 98 68 cf 67 67 eb cf 7b 0f 5d |WGoI...h.gg..{.]|
[e98 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f f7 8a 14 1c 58 d0 f7 f6 cb c6 |0E.!......X.....|
00000010 a1 d9 ad ae 1d 1c 81 8e 88 2c 30 5e d0 50 60 c7 |.........,0^.P`.|
00000020 ab 9d ca 13 51 02 20 5b a0 89 1f 58 88 12 83 fa |....Q. [...X....|
00000030 0f b0 09 8a 9e ff 14 59 e6 3a 4a 5a d6 14 38 e9 |.......Y.:JZ..8.|
00000040 2a d2 62 a1 1c 10 03 |*.b....|
[e96 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 11699835694894666340 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes
[e99 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 11699835694894666340 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes
[e9a 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e9b 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e9c 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e9d 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9270 gate 1578074098046810900 evaluation starts
[e9e 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[e9f 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9270 signed by 0 principal evaluation starts (used [false])
[ea0 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9270 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[ea1 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[ea2 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9270 principal evaluation fails
[ea3 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9270 gate 1578074098046810900 evaluation fails
[ea4 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[ea5 01-03 17:54:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[ea6 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[ea7 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 8a 8d a2 05 fa 69 ca 89 bb 56 72 01 72 b7 7d |......i...Vr.r.}|
00000010 57 47 6f 49 8e cb 98 68 cf 67 67 eb cf 7b 0f 5d |WGoI...h.gg..{.]|
[ea8 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f f7 8a 14 1c 58 d0 f7 f6 cb c6 |0E.!......X.....|
00000010 a1 d9 ad ae 1d 1c 81 8e 88 2c 30 5e d0 50 60 c7 |.........,0^.P`.|
00000020 ab 9d ca 13 51 02 20 5b a0 89 1f 58 88 12 83 fa |....Q. [...X....|
00000030 0f b0 09 8a 9e ff 14 59 e6 3a 4a 5a d6 14 38 e9 |.......Y.:JZ..8.|
00000040 2a d2 62 a1 1c 10 03 |*.b....|
[ea9 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[eaa 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9b70 gate 1578074098054407000 evaluation starts
[eab 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9b70 signed by 0 principal evaluation starts (used [false])
[eac 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9b70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[ead 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9b70 principal evaluation succeeds for identity 0
[eae 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9b70 gate 1578074098054407000 evaluation succeeds
[eaf 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[eb0 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[eb1 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[eb2 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[eb3 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[eb4 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}
[eb5 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22
[eb6 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22
[eb7 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[eb8 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[eb9 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[eba 01-03 17:54:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ebb 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[ebc 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ebd 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[ebe 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ebf 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ec0 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ec1 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ec2 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ec3 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ec4 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ec5 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ec6 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[ec7 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ec8 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[ec9 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[eca 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ecb 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[ecc 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ecd 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[ece 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[ecf 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ed0 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[ed1 01-03 17:54:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ed2 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[ed3 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[ed4 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ed5 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[ed6 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[ed7 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ed8 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[ed9 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[eda 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[edb 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[edc 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[edd 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[ede 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 2d 71 53 80 8b 04 ac 7e 03 1e d8 31 20 49 3d |.-qS....~...1 I=|
00000010 e3 a0 9a b5 4a fd c9 66 a9 97 94 66 29 05 f6 19 |....J..f...f)...|
[edf 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b fa 0a bc 67 cf f3 85 d1 f5 6e |0E.!.....g.....n|
00000010 11 a3 1e 6f 33 de 32 c6 26 79 f2 f2 e9 ea b4 1c |...o3.2.&y......|
00000020 69 af 35 91 d4 02 20 7e 8e d0 e8 cf 81 19 04 5f |i.5... ~......._|
00000030 a5 6a b8 70 5c 81 2b 95 5f cd 72 84 8d 88 5c 2f |.j.p\.+._.r...\/|
00000040 1e cb a4 5f e8 92 97 |..._...|
[ee0 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ee1 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefce0 gate 1578074098095123700 evaluation starts
[ee2 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefce0 signed by 0 principal evaluation starts (used [false])
[ee3 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefce0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[ee4 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[ee5 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefce0 principal evaluation fails
[ee6 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefce0 gate 1578074098095123700 evaluation fails
[ee7 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[ee8 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[ee9 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[eea 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 2d 71 53 80 8b 04 ac 7e 03 1e d8 31 20 49 3d |.-qS....~...1 I=|
00000010 e3 a0 9a b5 4a fd c9 66 a9 97 94 66 29 05 f6 19 |....J..f...f)...|
[eeb 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b fa 0a bc 67 cf f3 85 d1 f5 6e |0E.!.....g.....n|
00000010 11 a3 1e 6f 33 de 32 c6 26 79 f2 f2 e9 ea b4 1c |...o3.2.&y......|
00000020 69 af 35 91 d4 02 20 7e 8e d0 e8 cf 81 19 04 5f |i.5... ~......._|
00000030 a5 6a b8 70 5c 81 2b 95 5f cd 72 84 8d 88 5c 2f |.j.p\.+._.r...\/|
00000040 1e cb a4 5f e8 92 97 |..._...|
[eec 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[eed 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303c610 gate 1578074098099395400 evaluation starts
[eee 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303c610 signed by 0 principal evaluation starts (used [false])
[eef 01-03 17:54:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303c610 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[ef0 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303c610 principal evaluation succeeds for identity 0
[ef1 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303c610 gate 1578074098099395400 evaluation succeeds
[ef2 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[ef3 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[ef4 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[ef5 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[ef6 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[ef7 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}
[ef8 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24
[ef9 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24
[efa 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[efb 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[efc 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[efd 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[efe 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[eff 01-03 17:54:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f00 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f01 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f02 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f03 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f04 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f05 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f06 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f07 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[f08 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f09 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f0a 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[f0b 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[f0c 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f0d 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[f0e 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f0f 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[f10 01-03 17:54:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f11 01-03 17:54:58.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[f12 01-03 17:54:58.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f13 01-03 17:54:58.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[f14 01-03 17:54:58.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f15 01-03 17:54:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[f16 01-03 17:54:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[f17 01-03 17:54:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f18 01-03 17:54:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f19 01-03 17:54:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f1a 01-03 17:54:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f1b 01-03 17:54:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[f1c 01-03 17:54:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151015
[f1d 01-03 17:54:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 87887E6A24531C55A43D276746BEC833F85DBAD46920643916D3C4323D84E95C
[f1e 01-03 17:54:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[f1f 01-03 17:54:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[f20 01-03 17:54:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[f21 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f22 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f23 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f24 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[f25 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f26 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[f27 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[f28 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[f29 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f2a 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[f2b 01-03 17:54:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f2c 01-03 17:54:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[f2d 01-03 17:54:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f2e 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[f2f 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[f30 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f31 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[f32 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[f33 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 88 7e 6a 24 53 1c 55 a4 3d 27 67 46 be c8 33 |..~j$S.U.='gF..3|
00000010 f8 5d ba d4 69 20 64 39 16 d3 c4 32 3d 84 e9 5c |.]..i d9...2=..\|
[f34 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a 89 72 f9 70 2c fd 42 16 76 94 |0E.!...r.p,.B.v.|
00000010 e4 c2 b5 7b 45 be f1 0a 0e ed 3b 39 ca dc 8e 29 |...{E.....;9...)|
00000020 97 37 11 63 8b 02 20 75 9a f9 68 9c 87 da c3 fa |.7.c.. u..h.....|
00000030 55 ef 6f fb de 9d c7 12 10 cb 95 ae 3c 3b 6d 53 |U.o.........<;mS|
00000040 9b be a5 80 29 f8 da |....)..|
[f35 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[f36 01-03 17:54:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f37 01-03 17:54:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[f38 01-03 17:54:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[f39 01-03 17:54:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f3a 01-03 17:54:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f3b 01-03 17:54:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f3c 01-03 17:54:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f3d 01-03 17:54:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:3012056911203592569 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[f3e 01-03 17:54:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3012056911203592569 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[f3f 01-03 17:54:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[f40 01-03 17:54:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f41 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[f42 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f43 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[f44 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[f45 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d5 04 6d fa 2e 58 67 01 90 b9 46 0a 43 02 85 |...m..Xg...F.C..|
00000010 c2 fd c3 7a 0f 89 36 2c a1 0b e1 ac f7 99 ca 05 |...z..6,........|
[f46 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 86 76 c8 e7 4d 03 92 ae b1 c8 |0E.!...v..M.....|
00000010 07 a8 bd a6 1d bf ca 9b 28 e7 14 a9 ae 5c 5b 42 |........(....\[B|
00000020 46 30 78 2b 98 02 20 35 dc 9d 17 13 f0 26 e6 91 |F0x+.. 5.....&..|
00000030 cc bc 6d 7f d5 7d cc 54 42 12 e2 5c 37 0d 2e e0 |..m..}.TB..\7...|
00000040 72 a1 f1 be 58 56 d4 |r...XV.|
[f47 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[f48 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f7 df 8e b9 d7 61 a8 e3 b7 4b ed |0D. |.....a...K.|
00000010 7d 04 47 b6 e5 21 8d 18 40 c2 a3 51 0a c9 09 bf |}.G..!..@..Q....|
00000020 db ba bc fa 02 20 0b db 7a bc 06 69 80 82 04 22 |..... ..z..i..."|
00000030 6f 84 96 1a 37 b3 83 eb ee 8a 35 7e f8 ed 0b 97 |o...7.....5~....|
00000040 61 23 0b 2b 7d 1f |a#.+}.|
[f49 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[f4a 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[f4b 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25
[f4c 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25
[f4d 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[f4e 01-03 17:54:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f4f 01-03 17:54:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f50 01-03 17:54:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[f51 01-03 17:54:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f52 01-03 17:54:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f53 01-03 17:54:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[f54 01-03 17:54:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[f55 01-03 17:54:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[f56 01-03 17:54:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f57 01-03 17:54:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f58 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:12165670271859374676 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[f59 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:12165670271859374676 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[f5a 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12165670271859374676 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[f5b 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f5c 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f5d 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f5e 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f5f 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f60 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f61 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[f62 01-03 17:55:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f63 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:14507039831983758389 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[f64 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14507039831983758389 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[f65 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14507039831983758389 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[f66 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f67 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f68 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f69 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f6a 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f6b 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f6c 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[f6d 01-03 17:55:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f6e 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[f6f 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[f70 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f71 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[f72 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[f73 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f74 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[f75 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[f76 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[f77 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[f78 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[f79 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[f7a 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 83 f5 87 21 ba ec 57 fa eb c7 4a a5 16 bb 1a |W...!..W...J....|
00000010 b5 b5 9f 37 f1 be ad 1f a5 d1 6c 67 b2 29 bb 12 |...7......lg.)..|
[f7b 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 3a 0d d8 63 10 48 55 31 9d 9a |0E.!..:..c.HU1..|
00000010 76 e9 52 7b 72 a3 22 c7 e7 46 91 88 64 78 93 74 |v.R{r."..F..dx.t|
00000020 14 63 b2 9d e6 02 20 0a fe e3 d7 6b 87 34 21 0a |.c.... ....k.4!.|
00000030 ad d6 55 7d 2a 07 98 53 58 61 1b 83 98 ed bd ad |..U}*..SXa......|
00000040 ee ab 81 28 e8 d2 a3 |...(...|
[f7c 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f7d 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031684c0 gate 1578074101083657800 evaluation starts
[f7e 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031684c0 signed by 0 principal evaluation starts (used [false])
[f7f 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031684c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[f80 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031684c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[f81 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031684c0 principal evaluation fails
[f82 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031684c0 gate 1578074101083657800 evaluation fails
[f83 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[f84 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[f85 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[f86 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 83 f5 87 21 ba ec 57 fa eb c7 4a a5 16 bb 1a |W...!..W...J....|
00000010 b5 b5 9f 37 f1 be ad 1f a5 d1 6c 67 b2 29 bb 12 |...7......lg.)..|
[f87 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 3a 0d d8 63 10 48 55 31 9d 9a |0E.!..:..c.HU1..|
00000010 76 e9 52 7b 72 a3 22 c7 e7 46 91 88 64 78 93 74 |v.R{r."..F..dx.t|
00000020 14 63 b2 9d e6 02 20 0a fe e3 d7 6b 87 34 21 0a |.c.... ....k.4!.|
00000030 ad d6 55 7d 2a 07 98 53 58 61 1b 83 98 ed bd ad |..U}*..SXa......|
00000040 ee ab 81 28 e8 d2 a3 |...(...|
[f88 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f89 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003168ed0 gate 1578074101084341500 evaluation starts
[f8a 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003168ed0 signed by 0 principal evaluation starts (used [false])
[f8b 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003168ed0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[f8c 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003168ed0 principal evaluation succeeds for identity 0
[f8d 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003168ed0 gate 1578074101084341500 evaluation succeeds
[f8e 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[f8f 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[f90 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[f91 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[f92 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[f93 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes]}
[f94 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25
[f95 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25
[f96 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[f97 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f98 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f99 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f9a 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[f9b 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f9c 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f9d 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f9e 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers
[f9f 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[fa0 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[fa1 01-03 17:55:01.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fa2 01-03 17:55:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[fa3 01-03 17:55:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[fa4 01-03 17:55:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fa5 01-03 17:55:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[fa6 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[fa7 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[fa8 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[fa9 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[faa 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[fab 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[fac 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[fad 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[fae 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc d4 7a b7 43 fc 6b 81 2c cb 2d 12 64 b2 93 43 |..z.C.k.,.-.d..C|
00000010 f0 f1 c8 84 97 f1 c9 27 ac c0 3c 37 8e 9d ae 62 |.......'..<7...b|
[faf 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da eb 88 db a4 a6 5e 0b ef 21 f4 |0E.!.......^..!.|
00000010 6c a5 a4 7d 13 95 12 8f 33 07 71 46 c6 b6 00 73 |l..}....3.qF...s|
00000020 d8 44 d0 09 2b 02 20 51 7f 5a f5 b7 56 8b 36 87 |.D..+. Q.Z..V.6.|
00000030 39 40 3a 95 4d 75 ab 83 bb 13 c7 d1 2d a6 e2 92 |9@:.Mu......-...|
00000040 13 1c b2 78 d8 15 71 |...x..q|
[fb0 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[fb1 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8040 gate 1578074101114132500 evaluation starts
[fb2 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8040 signed by 0 principal evaluation starts (used [false])
[fb3 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8040 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[fb4 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[fb5 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8040 principal evaluation fails
[fb6 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8040 gate 1578074101114132500 evaluation fails
[fb7 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[fb8 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[fb9 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[fba 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc d4 7a b7 43 fc 6b 81 2c cb 2d 12 64 b2 93 43 |..z.C.k.,.-.d..C|
00000010 f0 f1 c8 84 97 f1 c9 27 ac c0 3c 37 8e 9d ae 62 |.......'..<7...b|
[fbb 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da eb 88 db a4 a6 5e 0b ef 21 f4 |0E.!.......^..!.|
00000010 6c a5 a4 7d 13 95 12 8f 33 07 71 46 c6 b6 00 73 |l..}....3.qF...s|
00000020 d8 44 d0 09 2b 02 20 51 7f 5a f5 b7 56 8b 36 87 |.D..+. Q.Z..V.6.|
00000030 39 40 3a 95 4d 75 ab 83 bb 13 c7 d1 2d a6 e2 92 |9@:.Mu......-...|
00000040 13 1c b2 78 d8 15 71 |...x..q|
[fbc 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[fbd 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8940 gate 1578074101115606500 evaluation starts
[fbe 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8940 signed by 0 principal evaluation starts (used [false])
[fbf 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8940 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[fc0 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8940 principal evaluation succeeds for identity 0
[fc1 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c8940 gate 1578074101115606500 evaluation succeeds
[fc2 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[fc3 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[fc4 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[fc5 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[fc6 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes
[fc7 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes]}
[fc8 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23
[fc9 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23
[fca 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[fcb 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fcc 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fcd 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fce 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[fcf 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[fd0 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[fd1 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[fd2 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers
[fd3 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[fd4 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[fd5 01-03 17:55:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fd6 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[fd7 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2047289917266505520 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[fd8 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[fd9 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4619586490345514845 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[fda 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[fdb 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2016802773918073994 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[fdc 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2016802773918073994 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[fdd 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fde 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2047289917266505520 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[fdf 01-03 17:55:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fe0 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2016802773918073994 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[fe1 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2016802773918073994 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[fe2 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fe3 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2047289917266505520 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[fe4 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2047289917266505520 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[fe5 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2047289917266505520 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[fe6 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fe7 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4619586490345514845 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[fe8 01-03 17:55:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fe9 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151016
[feb 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F0BEB675084CF75C136ECA60BD8E26F3A1E2BA72A645AAD5B0E7047CD82F475E
[fec 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[fed 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[fee 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[fea 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4619586490345514845 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[fef 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4619586490345514845 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[ff0 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4619586490345514845 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[ff1 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ff2 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[ff3 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ff4 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[ff5 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ff6 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[ff7 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[ff8 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[ff9 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ffa 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[ffb 01-03 17:55:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ffc 01-03 17:55:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[ffd 01-03 17:55:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ffe 01-03 17:55:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[fff 01-03 17:55:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1000 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 be b6 75 08 4c f7 5c 13 6e ca 60 bd 8e 26 f3 |...u.L.\.n.`..&.|
00000010 a1 e2 ba 72 a6 45 aa d5 b0 e7 04 7c d8 2f 47 5e |...r.E.....|./G^|
[1001 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb b7 91 ba 71 03 a4 ad 98 93 96 |0E.!.....q......|
00000010 cc 1e a3 75 73 ff 06 58 68 a6 69 81 05 4c a3 58 |...us..Xh.i..L.X|
00000020 9f d7 a4 50 48 02 20 32 d0 fc 91 e7 50 56 4b 2e |...PH. 2....PVK.|
00000030 3e bf 69 2e 3c 69 d8 18 88 68 f7 1c c6 eb 4d b1 |>.i.<i...h....M.|
00000040 b3 77 e6 d2 67 42 fb |.w..gB.|
[1002 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1003 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 e5 30 a7 da 88 61 74 df ac b1 9d |0D. v.0...at....|
00000010 22 32 19 62 03 a4 3c 58 ce 25 72 c5 3d 09 01 8e |"2.b..<X.%r.=...|
00000020 12 69 f6 65 02 20 28 53 eb a7 9d 71 28 bd 79 69 |.i.e. (S...q(.yi|
00000030 c1 ac e9 d4 e1 66 2e 5a 9b 98 e1 c3 74 35 76 6f |.....f.Z....t5vo|
00000040 bd 70 ce 5a 9a fa |.p.Z..|
[1004 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1005 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1006 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1007 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1008 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[1009 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[100a 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[100b 01-03 17:55:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[100c 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[100d 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[100f 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1010 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1011 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[100e 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[1012 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1014 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1015 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1013 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[1016 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc d4 7a b7 43 fc 6b 81 2c cb 2d 12 64 b2 93 43 |..z.C.k.,.-.d..C|
00000010 f0 f1 c8 84 97 f1 c9 27 ac c0 3c 37 8e 9d ae 62 |.......'..<7...b|
[1017 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da eb 88 db a4 a6 5e 0b ef 21 f4 |0E.!.......^..!.|
00000010 6c a5 a4 7d 13 95 12 8f 33 07 71 46 c6 b6 00 73 |l..}....3.qF...s|
00000020 d8 44 d0 09 2b 02 20 51 7f 5a f5 b7 56 8b 36 87 |.D..+. Q.Z..V.6.|
00000030 39 40 3a 95 4d 75 ab 83 bb 13 c7 d1 2d a6 e2 92 |9@:.Mu......-...|
00000040 13 1c b2 78 d8 15 71 |...x..q|
[1018 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1019 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1610 gate 1578074101336597700 evaluation starts
[101a 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1610 signed by 0 principal evaluation starts (used [false])
[101b 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1610 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[101c 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[101d 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1610 principal evaluation fails
[101e 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1610 gate 1578074101336597700 evaluation fails
[101f 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1020 01-03 17:55:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1021 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1022 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc d4 7a b7 43 fc 6b 81 2c cb 2d 12 64 b2 93 43 |..z.C.k.,.-.d..C|
00000010 f0 f1 c8 84 97 f1 c9 27 ac c0 3c 37 8e 9d ae 62 |.......'..<7...b|
[1023 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da eb 88 db a4 a6 5e 0b ef 21 f4 |0E.!.......^..!.|
00000010 6c a5 a4 7d 13 95 12 8f 33 07 71 46 c6 b6 00 73 |l..}....3.qF...s|
00000020 d8 44 d0 09 2b 02 20 51 7f 5a f5 b7 56 8b 36 87 |.D..+. Q.Z..V.6.|
00000030 39 40 3a 95 4d 75 ab 83 bb 13 c7 d1 2d a6 e2 92 |9@:.Mu......-...|
00000040 13 1c b2 78 d8 15 71 |...x..q|
[1024 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1025 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1f10 gate 1578074101348067700 evaluation starts
[1026 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1f10 signed by 0 principal evaluation starts (used [false])
[1027 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1f10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1028 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1f10 principal evaluation succeeds for identity 0
[1029 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1f10 gate 1578074101348067700 evaluation succeeds
[102a 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[102b 01-03 17:55:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[102c 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[102d 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[102e 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes
[102f 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1030 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1031 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 be b6 75 08 4c f7 5c 13 6e ca 60 bd 8e 26 f3 |...u.L.\.n.`..&.|
00000010 a1 e2 ba 72 a6 45 aa d5 b0 e7 04 7c d8 2f 47 5e |...r.E.....|./G^|
[1032 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb b7 91 ba 71 03 a4 ad 98 93 96 |0E.!.....q......|
00000010 cc 1e a3 75 73 ff 06 58 68 a6 69 81 05 4c a3 58 |...us..Xh.i..L.X|
00000020 9f d7 a4 50 48 02 20 32 d0 fc 91 e7 50 56 4b 2e |...PH. 2....PVK.|
00000030 3e bf 69 2e 3c 69 d8 18 88 68 f7 1c c6 eb 4d b1 |>.i.<i...h....M.|
00000040 b3 77 e6 d2 67 42 fb |.w..gB.|
[1033 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1034 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1035 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1036 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1037 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d5 04 6d fa 2e 58 67 01 90 b9 46 0a 43 02 85 |...m..Xg...F.C..|
00000010 c2 fd c3 7a 0f 89 36 2c a1 0b e1 ac f7 99 ca 05 |...z..6,........|
[1038 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 86 76 c8 e7 4d 03 92 ae b1 c8 |0E.!...v..M.....|
00000010 07 a8 bd a6 1d bf ca 9b 28 e7 14 a9 ae 5c 5b 42 |........(....\[B|
00000020 46 30 78 2b 98 02 20 35 dc 9d 17 13 f0 26 e6 91 |F0x+.. 5.....&..|
00000030 cc bc 6d 7f d5 7d cc 54 42 12 e2 5c 37 0d 2e e0 |..m..}.TB..\7...|
00000040 72 a1 f1 be 58 56 d4 |r...XV.|
[1039 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[103a 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[103b 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[103c 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[103d 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[103e 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[103f 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1040 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1041 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1042 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1043 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1044 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1045 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1046 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 83 f5 87 21 ba ec 57 fa eb c7 4a a5 16 bb 1a |W...!..W...J....|
00000010 b5 b5 9f 37 f1 be ad 1f a5 d1 6c 67 b2 29 bb 12 |...7......lg.)..|
[1047 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 3a 0d d8 63 10 48 55 31 9d 9a |0E.!..:..c.HU1..|
00000010 76 e9 52 7b 72 a3 22 c7 e7 46 91 88 64 78 93 74 |v.R{r."..F..dx.t|
00000020 14 63 b2 9d e6 02 20 0a fe e3 d7 6b 87 34 21 0a |.c.... ....k.4!.|
00000030 ad d6 55 7d 2a 07 98 53 58 61 1b 83 98 ed bd ad |..U}*..SXa......|
00000040 ee ab 81 28 e8 d2 a3 |...(...|
[1048 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1049 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033331f0 gate 1578074101358350800 evaluation starts
[104a 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033331f0 signed by 0 principal evaluation starts (used [false])
[104b 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033331f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[104c 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033331f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[104d 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033331f0 principal evaluation fails
[104e 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033331f0 gate 1578074101358350800 evaluation fails
[104f 01-03 17:55:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1050 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1051 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1052 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 83 f5 87 21 ba ec 57 fa eb c7 4a a5 16 bb 1a |W...!..W...J....|
00000010 b5 b5 9f 37 f1 be ad 1f a5 d1 6c 67 b2 29 bb 12 |...7......lg.)..|
[1053 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 3a 0d d8 63 10 48 55 31 9d 9a |0E.!..:..c.HU1..|
00000010 76 e9 52 7b 72 a3 22 c7 e7 46 91 88 64 78 93 74 |v.R{r."..F..dx.t|
00000020 14 63 b2 9d e6 02 20 0a fe e3 d7 6b 87 34 21 0a |.c.... ....k.4!.|
00000030 ad d6 55 7d 2a 07 98 53 58 61 1b 83 98 ed bd ad |..U}*..SXa......|
00000040 ee ab 81 28 e8 d2 a3 |...(...|
[1054 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1055 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333af0 gate 1578074101360773700 evaluation starts
[1056 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333af0 signed by 0 principal evaluation starts (used [false])
[1057 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333af0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1058 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333af0 principal evaluation succeeds for identity 0
[1059 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333af0 gate 1578074101360773700 evaluation succeeds
[105a 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[105b 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[105c 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[105d 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[105e 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[105f 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1060 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1061 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d5 04 6d fa 2e 58 67 01 90 b9 46 0a 43 02 85 |...m..Xg...F.C..|
00000010 c2 fd c3 7a 0f 89 36 2c a1 0b e1 ac f7 99 ca 05 |...z..6,........|
[1062 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 86 76 c8 e7 4d 03 92 ae b1 c8 |0E.!...v..M.....|
00000010 07 a8 bd a6 1d bf ca 9b 28 e7 14 a9 ae 5c 5b 42 |........(....\[B|
00000020 46 30 78 2b 98 02 20 35 dc 9d 17 13 f0 26 e6 91 |F0x+.. 5.....&..|
00000030 cc bc 6d 7f d5 7d cc 54 42 12 e2 5c 37 0d 2e e0 |..m..}.TB..\7...|
00000040 72 a1 f1 be 58 56 d4 |r...XV.|
[1063 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[1064 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1065 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1066 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 be b6 75 08 4c f7 5c 13 6e ca 60 bd 8e 26 f3 |...u.L.\.n.`..&.|
00000010 a1 e2 ba 72 a6 45 aa d5 b0 e7 04 7c d8 2f 47 5e |...r.E.....|./G^|
[1067 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb b7 91 ba 71 03 a4 ad 98 93 96 |0E.!.....q......|
00000010 cc 1e a3 75 73 ff 06 58 68 a6 69 81 05 4c a3 58 |...us..Xh.i..L.X|
00000020 9f d7 a4 50 48 02 20 32 d0 fc 91 e7 50 56 4b 2e |...PH. 2....PVK.|
00000030 3e bf 69 2e 3c 69 d8 18 88 68 f7 1c c6 eb 4d b1 |>.i.<i...h....M.|
00000040 b3 77 e6 d2 67 42 fb |.w..gB.|
[1068 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1069 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[106a 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[106b 01-03 17:55:01.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[106c 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[106d 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[106e 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[106f 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1070 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1071 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1072 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1073 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1074 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1075 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1076 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1077 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1078 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1079 01-03 17:55:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[107a 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[107c 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[107d 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[107e 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[107f 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1080 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1081 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1082 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1083 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1084 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb870 gate 1578074101520887000 evaluation starts
[1085 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb870 signed by 0 principal evaluation starts (used [false])
[1086 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb870 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1087 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1088 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb870 principal evaluation fails
[1089 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb870 gate 1578074101520887000 evaluation fails
[108a 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[108b 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[108c 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[108d 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[108e 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[108f 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1090 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452170 gate 1578074101522257500 evaluation starts
[1091 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452170 signed by 0 principal evaluation starts (used [false])
[1092 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452170 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1093 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452170 principal evaluation succeeds for identity 0
[1094 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452170 gate 1578074101522257500 evaluation succeeds
[1095 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1096 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1097 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1098 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[107b 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes
[1099 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[109a 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[109b 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[109d 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[109e 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[109f 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10a0 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10a1 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7151328045761247576 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[10a2 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7151328045761247576 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[10a3 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[109c 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[10a4 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[10a5 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[10a6 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[10a7 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510041801
[10a8 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 43C0BF0E8F768F0224083A82167181855D9ED122B57F3AF9EC46F64F160F715E
[10a9 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[10aa 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10ab 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10ac 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[10ad 01-03 17:55:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[10ae 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[10af 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[10b0 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[10b1 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[10b2 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[10b3 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[10b4 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10b5 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580bd0 gate 1578074101532043700 evaluation starts
[10b6 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580bd0 signed by 0 principal evaluation starts (used [false])
[10b7 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580bd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[10b8 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[10b9 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580bd0 principal evaluation fails
[10ba 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580bd0 gate 1578074101532043700 evaluation fails
[10bb 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[10bc 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[10bd 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[10be 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[10bf 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[10c0 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10c1 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035814d0 gate 1578074101533516600 evaluation starts
[10c2 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035814d0 signed by 0 principal evaluation starts (used [false])
[10c3 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035814d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[10c4 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035814d0 principal evaluation succeeds for identity 0
[10c5 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035814d0 gate 1578074101533516600 evaluation succeeds
[10c6 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[10c7 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[10c8 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[10c9 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[10ca 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10cb 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes
[10cc 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[10cd 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[10ce 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[10cf 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[10d0 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10d1 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10d2 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[10d3 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[10d4 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[10d5 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[10d6 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[10d7 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[10d8 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[10d9 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[10da 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10db 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5ea0 gate 1578074101535100800 evaluation starts
[10dc 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5ea0 signed by 0 principal evaluation starts (used [false])
[10dd 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5ea0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[10de 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[10df 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5ea0 principal evaluation fails
[10e0 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5ea0 gate 1578074101535100800 evaluation fails
[10e1 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[10e2 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[10e3 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[10e4 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[10e5 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[10e6 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10e7 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e7a0 gate 1578074101535513600 evaluation starts
[10e8 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e7a0 signed by 0 principal evaluation starts (used [false])
[10e9 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e7a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[10ea 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e7a0 principal evaluation succeeds for identity 0
[10eb 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362e7a0 gate 1578074101535513600 evaluation succeeds
[10ec 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[10ed 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[10ee 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[10ef 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[10f0 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10f1 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes
[10f2 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10f3 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10f4 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10f5 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[10f6 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[10f7 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[10f8 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[10f9 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[10fa 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[10fb 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[10fc 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[10fd 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10fe 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c4c0 gate 1578074101536482600 evaluation starts
[10ff 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c4c0 signed by 0 principal evaluation starts (used [false])
[1100 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c4c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1101 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1102 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c4c0 principal evaluation fails
[1103 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c4c0 gate 1578074101536482600 evaluation fails
[1104 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1105 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1106 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1107 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1108 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1109 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[110a 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cfc0 gate 1578074101536889100 evaluation starts
[110b 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cfc0 signed by 0 principal evaluation starts (used [false])
[110c 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cfc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[110d 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cfc0 principal evaluation succeeds for identity 0
[110e 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cfc0 gate 1578074101536889100 evaluation succeeds
[110f 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1110 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1111 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1112 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1113 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1114 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1115 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1116 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1117 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1118 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1119 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[111a 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[111b 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[111c 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[111d 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[111e 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[111f 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1120 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1121 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1122 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1123 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[1124 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1125 01-03 17:55:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1126 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1127 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1128 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1129 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036990d0 gate 1578074101546889400 evaluation starts
[112a 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036990d0 signed by 0 principal evaluation starts (used [false])
[112b 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036990d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[112c 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036990d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[112d 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036990d0 principal evaluation fails
[112e 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036990d0 gate 1578074101546889400 evaluation fails
[112f 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1130 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1131 01-03 17:55:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1132 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1133 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1134 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1135 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036999f0 gate 1578074101552797600 evaluation starts
[1136 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036999f0 signed by 0 principal evaluation starts (used [false])
[1137 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036999f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1138 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036999f0 principal evaluation succeeds for identity 0
[1139 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036999f0 gate 1578074101552797600 evaluation succeeds
[113a 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[113b 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[113c 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[113d 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[113e 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[113f 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7151328045761247576 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[1140 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7151328045761247576 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[1141 01-03 17:55:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1142 01-03 17:55:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[1143 01-03 17:55:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1144 01-03 17:55:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1145 01-03 17:55:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1146 01-03 17:55:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14512545454380996395 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1147 01-03 17:55:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14512545454380996395 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1148 01-03 17:55:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1149 01-03 17:55:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[114a 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[114b 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[114c 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[114d 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[114e 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 4f 09 74 2b 83 cf 0b 3b 26 68 2e 93 fe ce f4 |.O.t+...;&h.....|
00000010 e0 20 b3 bb 74 84 80 b1 59 ee 3b 1b 79 26 62 67 |. ..t...Y.;.y&bg|
[114f 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 9e 7d 35 a9 fd 21 bb e1 7a 62 f9 |0D. ..}5..!..zb.|
00000010 30 ee 2d 2a a7 a5 ba 1b 0a 32 77 d2 f9 e8 f9 8a |0.-*.....2w.....|
00000020 83 62 00 cf 02 20 1b bc cc 96 19 19 db 60 c2 cd |.b... .......`..|
00000030 f8 7c cf 9a 9b b0 e3 c7 27 e6 4f a3 39 f8 de 6f |.|......'.O.9..o|
00000040 42 14 cf 62 a2 e4 |B..b..|
[1150 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1151 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd a8 5d f8 40 3f b1 4a c4 67 18 |0E.!...].@?.J.g.|
00000010 0e 8c 3b 0e a9 da 32 90 82 aa 8d 13 08 c6 ce 65 |..;...2........e|
00000020 37 bb d2 af 9a 02 20 00 e7 3f 6a 7b 3a af 07 ba |7..... ..?j{:...|
00000030 90 8f 1a 4d d8 3e 0b f3 af 8a 8f 91 d9 91 7b 0b |...M.>........{.|
00000040 5f ca 4f b6 9f 81 c2 |_.O....|
[1152 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1153 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[1154 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26
[1155 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26
[1156 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[1157 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1158 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1159 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[115a 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[115b 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[115c 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[115d 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[115e 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[115f 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1160 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1161 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1162 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1163 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1164 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1165 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1166 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1167 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1168 01-03 17:55:01.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1169 01-03 17:55:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[116a 01-03 17:55:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[116b 01-03 17:55:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[116c 01-03 17:55:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[116d 01-03 17:55:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[116e 01-03 17:55:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[116f 01-03 17:55:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1170 01-03 17:55:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1171 01-03 17:55:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1172 01-03 17:55:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1173 01-03 17:55:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1174 01-03 17:55:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1175 01-03 17:55:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1176 01-03 17:55:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1177 01-03 17:55:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1178 01-03 17:55:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1179 01-03 17:55:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[117a 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[117b 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[117c 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[117d 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[117e 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[117f 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1180 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1181 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1182 01-03 17:55:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1183 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1184 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1185 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1186 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 62 20 57 97 46 63 2c 19 0e 62 00 91 bb 0d 11 |Pb W.Fc,..b.....|
00000010 cb 1e 5c 07 2d 34 c3 f2 22 40 ab eb 15 9b 02 8c |..\.-4.."@......|
[1187 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 19 87 4d 45 a8 a0 e8 e0 bf 57 94 |0D. ...ME.....W.|
00000010 d2 76 e7 b2 35 42 85 b1 20 c3 5f 1e 71 b5 4c 80 |.v..5B.. ._.q.L.|
00000020 de d5 e5 53 02 20 5d 1a 25 a3 8d 16 36 23 8c e8 |...S. ].%...6#..|
00000030 a9 1c 28 4a 98 da e8 4f ac 64 4c 69 b1 73 f5 7c |..(J...O.dLi.s.||
00000040 e7 90 ed 75 0f b1 |...u..|
[1188 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1189 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746fd0 gate 1578074103031403500 evaluation starts
[118a 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746fd0 signed by 0 principal evaluation starts (used [false])
[118b 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746fd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[118c 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[118d 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746fd0 principal evaluation fails
[118e 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746fd0 gate 1578074103031403500 evaluation fails
[118f 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1190 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1191 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1192 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 62 20 57 97 46 63 2c 19 0e 62 00 91 bb 0d 11 |Pb W.Fc,..b.....|
00000010 cb 1e 5c 07 2d 34 c3 f2 22 40 ab eb 15 9b 02 8c |..\.-4.."@......|
[1193 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 19 87 4d 45 a8 a0 e8 e0 bf 57 94 |0D. ...ME.....W.|
00000010 d2 76 e7 b2 35 42 85 b1 20 c3 5f 1e 71 b5 4c 80 |.v..5B.. ._.q.L.|
00000020 de d5 e5 53 02 20 5d 1a 25 a3 8d 16 36 23 8c e8 |...S. ].%...6#..|
00000030 a9 1c 28 4a 98 da e8 4f ac 64 4c 69 b1 73 f5 7c |..(J...O.dLi.s.||
00000040 e7 90 ed 75 0f b1 |...u..|
[1194 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1195 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478d0 gate 1578074103039379400 evaluation starts
[1196 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478d0 signed by 0 principal evaluation starts (used [false])
[1197 01-03 17:55:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1198 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478d0 principal evaluation succeeds for identity 0
[1199 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478d0 gate 1578074103039379400 evaluation succeeds
[119a 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[119b 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[119c 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[119d 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[119e 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[119f 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}
[11a0 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24
[11a1 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24
[11a2 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[11a3 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11a4 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11a5 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11a6 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11a7 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11a8 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[11a9 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[11aa 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11ab 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[11ac 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11ad 01-03 17:55:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11ae 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11b0 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11af 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[11b1 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11b2 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[11b3 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11b4 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11b5 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11b6 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[11b7 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11b8 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[11b9 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[11bb 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11ba 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[11bc 01-03 17:55:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11bd 01-03 17:55:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11be 01-03 17:55:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11bf 01-03 17:55:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11c0 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11c1 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[11c2 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11c3 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[11c4 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[11c5 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[11c6 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[11c7 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[11c8 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[11c9 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 38 66 70 dd 00 c2 45 32 a6 26 4f 49 ba 5d 1f |.8fp...E2.&OI.].|
00000010 3a 83 a2 2c ad 09 29 99 2e 0d 9d 4e 60 04 4a cc |:..,..)....N`.J.|
[11cb 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 14 9f 12 e7 a6 80 ce eb e5 13 a4 |0D. ............|
00000010 ae 33 14 8b c9 e6 e4 6a 2d e5 46 8e 89 0d 08 05 |.3.....j-.F.....|
00000020 41 2a 84 90 02 20 7b e8 7b 5e 3f 99 20 e9 b9 83 |A*... {.{^?. ...|
00000030 a1 77 d6 fb 7e 4b bc 0e 67 18 67 cf e0 70 18 09 |.w..~K..g.g..p..|
00000040 f0 7a 42 d7 94 34 |.zB..4|
[11ca 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11cc 01-03 17:55:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11cd 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[11ce 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037699a0 gate 1578074103101384400 evaluation starts
[11cf 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037699a0 signed by 0 principal evaluation starts (used [false])
[11d0 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037699a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[11d1 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037699a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[11d2 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037699a0 principal evaluation fails
[11d3 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037699a0 gate 1578074103101384400 evaluation fails
[11d4 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[11d5 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[11d6 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[11d7 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 38 66 70 dd 00 c2 45 32 a6 26 4f 49 ba 5d 1f |.8fp...E2.&OI.].|
00000010 3a 83 a2 2c ad 09 29 99 2e 0d 9d 4e 60 04 4a cc |:..,..)....N`.J.|
[11d8 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 14 9f 12 e7 a6 80 ce eb e5 13 a4 |0D. ............|
00000010 ae 33 14 8b c9 e6 e4 6a 2d e5 46 8e 89 0d 08 05 |.3.....j-.F.....|
00000020 41 2a 84 90 02 20 7b e8 7b 5e 3f 99 20 e9 b9 83 |A*... {.{^?. ...|
00000030 a1 77 d6 fb 7e 4b bc 0e 67 18 67 cf e0 70 18 09 |.w..~K..g.g..p..|
00000040 f0 7a 42 d7 94 34 |.zB..4|
[11d9 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[11da 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e42a0 gate 1578074103105815000 evaluation starts
[11db 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e42a0 signed by 0 principal evaluation starts (used [false])
[11dc 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e42a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[11dd 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e42a0 principal evaluation succeeds for identity 0
[11de 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e42a0 gate 1578074103105815000 evaluation succeeds
[11df 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[11e0 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[11e1 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[11e2 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[11e3 01-03 17:55:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11e4 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes]}
[11e5 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26
[11e6 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26
[11e7 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[11e8 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11e9 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11ea 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11eb 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11ed 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11ec 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11ee 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11ef 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11f0 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11f1 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11f2 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11f3 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11f4 01-03 17:55:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11f5 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[11f6 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11f7 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11f8 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11f9 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[11fa 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11fb 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11fc 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11fd 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11fe 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[11ff 01-03 17:55:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1200 01-03 17:55:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151017
[1201 01-03 17:55:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FCDE9BE85625B3235B03E02DDD24D3378F10804EB9C9D0DB5A27F2A6D561D39A
[1202 01-03 17:55:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1203 01-03 17:55:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1204 01-03 17:55:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[1205 01-03 17:55:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1206 01-03 17:55:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1207 01-03 17:55:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[1208 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1209 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[120b 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[120a 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[120c 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[120d 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes
[120e 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[120f 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1210 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes
[1211 01-03 17:55:03.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1212 01-03 17:55:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:3947721233016205225 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1213 01-03 17:55:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3947721233016205225 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1214 01-03 17:55:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1215 01-03 17:55:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1216 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1217 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1218 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1219 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[121a 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 da 75 fb 49 5f 35 26 14 b6 41 f6 66 f6 c2 dd |..u.I_5&..A.f...|
00000010 9e b5 8a e0 46 28 e3 42 a5 00 d0 2a 99 e1 74 ea |....F(.B...*..t.|
[121b 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 90 e1 bd 3f b2 97 61 af 38 83 |0E.!.....?..a.8.|
00000010 08 fb 81 eb 91 fc f5 cb 46 86 96 ad 8f af 6a 88 |........F.....j.|
00000020 84 8a 14 26 6f 02 20 2a 04 fc 2c 46 d1 ac e5 82 |...&o. *..,F....|
00000030 ec 06 fc 47 87 2f 08 f3 84 67 1d 5e bf bc 8f fc |...G./...g.^....|
00000040 7b 75 50 6e 30 d5 77 |{uPn0.w|
[121c 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[121d 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 7d ea b0 6a 9c a8 f0 ac ac 71 |0E.!..}..j.....q|
00000010 54 25 49 5c dd c2 15 99 f0 12 af 37 a7 ff 4b f1 |T%I\.......7..K.|
00000020 2c 9a 35 df 67 02 20 21 63 3c 69 5e d8 67 fa 5b |,.5.g. !c<i^.g.[|
00000030 d2 23 94 6e a9 b3 6a 37 5e cb 77 d9 c6 54 73 19 |.#.n..j7^.w..Ts.|
00000040 a9 d6 10 99 8f 1c 3a |......:|
[121e 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[121f 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[1220 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27
[1221 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27
[1222 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[1223 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1224 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1225 01-03 17:55:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1226 01-03 17:55:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1227 01-03 17:55:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1228 01-03 17:55:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[1229 01-03 17:55:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[122a 01-03 17:55:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[122b 01-03 17:55:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[122c 01-03 17:55:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[122d 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6933452664425335485 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[122e 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:6933452664425335485 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[122f 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6933452664425335485 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1230 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1231 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1232 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1233 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1234 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1235 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1236 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[1237 01-03 17:55:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1238 01-03 17:55:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:565297426437196215 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1239 01-03 17:55:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:565297426437196215 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[123a 01-03 17:55:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:565297426437196215 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[123b 01-03 17:55:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[123c 01-03 17:55:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[123d 01-03 17:55:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[123e 01-03 17:55:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[123f 01-03 17:55:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1240 01-03 17:55:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1241 01-03 17:55:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1242 01-03 17:55:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1243 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1244 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1245 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1246 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1247 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[1248 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1249 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[124a 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[124b 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[124c 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[124d 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[124e 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[124f 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 ef b0 66 50 85 b9 0d 56 51 10 e0 57 21 e6 6a |...fP...VQ..W!.j|
00000010 62 60 62 8e a4 1f 82 45 6e b7 57 84 e7 66 d5 d9 |b`b....En.W..f..|
[1250 01-03 17:55:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 ea 17 db 26 2f 6d 32 62 61 5d |0E.!.....&/m2ba]|
00000010 08 5d 97 e1 4c 67 61 8f 7f d4 9c 55 2d 38 92 ba |.]..Lga....U-8..|
00000020 a9 e4 84 a0 17 02 20 2f 07 ad 05 7c 75 53 be 33 |...... /...|uS.3|
00000030 12 ef eb 7e 4f c7 c6 ac d4 39 be a2 d6 7d 2b 9c |...~O....9...}+.|
00000040 d1 7a 0a 97 fa 8f ab |.z.....|
[1251 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1252 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961740 gate 1578074105090085400 evaluation starts
[1253 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961740 signed by 0 principal evaluation starts (used [false])
[1254 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961740 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1255 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1256 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961740 principal evaluation fails
[1257 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961740 gate 1578074105090085400 evaluation fails
[1258 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1259 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[125a 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[125b 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 ef b0 66 50 85 b9 0d 56 51 10 e0 57 21 e6 6a |...fP...VQ..W!.j|
00000010 62 60 62 8e a4 1f 82 45 6e b7 57 84 e7 66 d5 d9 |b`b....En.W..f..|
[125c 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 ea 17 db 26 2f 6d 32 62 61 5d |0E.!.....&/m2ba]|
00000010 08 5d 97 e1 4c 67 61 8f 7f d4 9c 55 2d 38 92 ba |.]..Lga....U-8..|
00000020 a9 e4 84 a0 17 02 20 2f 07 ad 05 7c 75 53 be 33 |...... /...|uS.3|
00000030 12 ef eb 7e 4f c7 c6 ac d4 39 be a2 d6 7d 2b 9c |...~O....9...}+.|
00000040 d1 7a 0a 97 fa 8f ab |.z.....|
[125d 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[125e 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa050 gate 1578074105090506700 evaluation starts
[125f 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa050 signed by 0 principal evaluation starts (used [false])
[1260 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa050 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1261 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa050 principal evaluation succeeds for identity 0
[1262 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa050 gate 1578074105090506700 evaluation succeeds
[1263 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1264 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1265 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1266 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1267 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[1268 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes]}
[1269 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27
[126a 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27
[126b 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[126c 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[126d 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[126e 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[126f 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1270 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1271 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1272 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1273 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[1274 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1275 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1276 01-03 17:55:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1277 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1278 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1279 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[127a 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[127b 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[127c 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[127d 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[127e 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[127f 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1280 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1281 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1282 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1283 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 7c 01 ee 69 ef 8f 3d b1 cb 5d bc 9f 16 14 99 |.|..i..=..].....|
00000010 2f d0 c4 d0 ae 6d 9b 7f 8b 91 37 7c 03 f3 23 22 |/....m....7|..#"|
[1284 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c e4 25 d5 f6 28 9d 9d aa 1a fb df |0D. \.%..(......|
00000010 93 2f 99 b1 19 7c 09 d1 a9 85 76 01 f5 8d b0 ac |./...|....v.....|
00000020 f9 77 53 d1 02 20 64 28 af 15 a4 e5 6b 16 7d 79 |.wS.. d(....k.}y|
00000030 1a 25 4d 47 1e fe 35 57 35 9d b5 e3 ef 62 b6 eb |.%MG..5W5....b..|
00000040 72 44 a1 a3 11 76 |rD...v|
[1285 01-03 17:55:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1286 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f80 gate 1578074105110054200 evaluation starts
[1287 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f80 signed by 0 principal evaluation starts (used [false])
[1288 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1289 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[128a 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f80 principal evaluation fails
[128b 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f80 gate 1578074105110054200 evaluation fails
[128c 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[128d 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[128e 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[128f 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 7c 01 ee 69 ef 8f 3d b1 cb 5d bc 9f 16 14 99 |.|..i..=..].....|
00000010 2f d0 c4 d0 ae 6d 9b 7f 8b 91 37 7c 03 f3 23 22 |/....m....7|..#"|
[1290 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c e4 25 d5 f6 28 9d 9d aa 1a fb df |0D. \.%..(......|
00000010 93 2f 99 b1 19 7c 09 d1 a9 85 76 01 f5 8d b0 ac |./...|....v.....|
00000020 f9 77 53 d1 02 20 64 28 af 15 a4 e5 6b 16 7d 79 |.wS.. d(....k.}y|
00000030 1a 25 4d 47 1e fe 35 57 35 9d b5 e3 ef 62 b6 eb |.%MG..5W5....b..|
00000040 72 44 a1 a3 11 76 |rD...v|
[1291 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1292 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15890 gate 1578074105111968200 evaluation starts
[1293 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15890 signed by 0 principal evaluation starts (used [false])
[1294 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15890 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1295 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15890 principal evaluation succeeds for identity 0
[1296 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15890 gate 1578074105111968200 evaluation succeeds
[1297 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1298 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1299 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[129a 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[129b 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes
[129c 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}
[129d 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25
[129e 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25
[129f 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[12a0 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12a1 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12a2 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12a3 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[12a4 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12a5 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12a6 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12a7 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[12a8 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[12a9 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[12aa 01-03 17:55:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12ab 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[12ac 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15155051232358068495 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[12ad 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[12ae 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15612967290541357992 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[12af 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[12b0 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7333914768463172838 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[12b1 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7333914768463172838 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[12b2 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12b3 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15612967290541357992 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[12b4 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12b5 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15155051232358068495 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[12b6 01-03 17:55:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12b7 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15612967290541357992 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[12b8 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15612967290541357992 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[12b9 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12ba 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7333914768463172838 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[12bb 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7333914768463172838 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[12bc 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7333914768463172838 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[12bd 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12be 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15155051232358068495 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[12bf 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15155051232358068495 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[12c0 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15155051232358068495 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[12c1 01-03 17:55:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12c2 01-03 17:55:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151018
[12c3 01-03 17:55:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 96C710A4F0B35F5C40A8D3DDDBB1DBF0730E390010C9C87695EC500DBE560BBA
[12c4 01-03 17:55:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[12c5 01-03 17:55:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[12c6 01-03 17:55:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[12c7 01-03 17:55:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12c8 01-03 17:55:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[12c9 01-03 17:55:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12ca 01-03 17:55:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[12cb 01-03 17:55:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[12cc 01-03 17:55:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12cd 01-03 17:55:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[12ce 01-03 17:55:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12cf 01-03 17:55:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[12d0 01-03 17:55:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12d1 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[12d2 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[12d3 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12d4 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[12d5 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[12d6 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d7 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[12d8 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[12d9 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[12da 01-03 17:55:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[12db 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[12dc 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[12dd 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 ef b0 66 50 85 b9 0d 56 51 10 e0 57 21 e6 6a |...fP...VQ..W!.j|
00000010 62 60 62 8e a4 1f 82 45 6e b7 57 84 e7 66 d5 d9 |b`b....En.W..f..|
[12de 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 ea 17 db 26 2f 6d 32 62 61 5d |0E.!.....&/m2ba]|
00000010 08 5d 97 e1 4c 67 61 8f 7f d4 9c 55 2d 38 92 ba |.]..Lga....U-8..|
00000020 a9 e4 84 a0 17 02 20 2f 07 ad 05 7c 75 53 be 33 |...... /...|uS.3|
00000030 12 ef eb 7e 4f c7 c6 ac d4 39 be a2 d6 7d 2b 9c |...~O....9...}+.|
00000040 d1 7a 0a 97 fa 8f ab |.z.....|
[12df 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[12e0 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a90bb0 gate 1578074105321988000 evaluation starts
[12e1 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a90bb0 signed by 0 principal evaluation starts (used [false])
[12e2 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[12e3 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a90bb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[12e4 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a90bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[12e5 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a90bb0 principal evaluation fails
[12e6 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a90bb0 gate 1578074105321988000 evaluation fails
[12e7 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[12e8 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[12e9 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[12ea 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 ef b0 66 50 85 b9 0d 56 51 10 e0 57 21 e6 6a |...fP...VQ..W!.j|
00000010 62 60 62 8e a4 1f 82 45 6e b7 57 84 e7 66 d5 d9 |b`b....En.W..f..|
[12eb 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 ea 17 db 26 2f 6d 32 62 61 5d |0E.!.....&/m2ba]|
00000010 08 5d 97 e1 4c 67 61 8f 7f d4 9c 55 2d 38 92 ba |.]..Lga....U-8..|
00000020 a9 e4 84 a0 17 02 20 2f 07 ad 05 7c 75 53 be 33 |...... /...|uS.3|
00000030 12 ef eb 7e 4f c7 c6 ac d4 39 be a2 d6 7d 2b 9c |...~O....9...}+.|
00000040 d1 7a 0a 97 fa 8f ab |.z.....|
[12ec 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[12ed 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91510 gate 1578074105327464600 evaluation starts
[12ef 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91510 signed by 0 principal evaluation starts (used [false])
[12f0 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91510 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[12f1 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91510 principal evaluation succeeds for identity 0
[12f2 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91510 gate 1578074105327464600 evaluation succeeds
[12ee 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[12f3 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[12f4 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[12f5 01-03 17:55:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[12f6 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[12f7 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[12f8 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12f9 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[12fa 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 da 75 fb 49 5f 35 26 14 b6 41 f6 66 f6 c2 dd |..u.I_5&..A.f...|
00000010 9e b5 8a e0 46 28 e3 42 a5 00 d0 2a 99 e1 74 ea |....F(.B...*..t.|
[12fb 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 90 e1 bd 3f b2 97 61 af 38 83 |0E.!.....?..a.8.|
00000010 08 fb 81 eb 91 fc f5 cb 46 86 96 ad 8f af 6a 88 |........F.....j.|
00000020 84 8a 14 26 6f 02 20 2a 04 fc 2c 46 d1 ac e5 82 |...&o. *..,F....|
00000030 ec 06 fc 47 87 2f 08 f3 84 67 1d 5e bf bc 8f fc |...G./...g.^....|
00000040 7b 75 50 6e 30 d5 77 |{uPn0.w|
[12fc 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[12fd 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12fe 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[12ff 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 c7 10 a4 f0 b3 5f 5c 40 a8 d3 dd db b1 db f0 |......_\@.......|
00000010 73 0e 39 00 10 c9 c8 76 95 ec 50 0d be 56 0b ba |s.9....v..P..V..|
[1300 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 86 7a 9f fc 24 fa 75 51 c3 43 5d |0D. T.z..$.uQ.C]|
00000010 0c 81 a5 72 a1 7a 2e ce 92 cd b2 1a 9b b2 02 fc |...r.z..........|
00000020 76 be a3 8b 02 20 08 c1 1b 88 b1 65 48 be 83 5e |v.... .....eH..^|
00000030 b4 79 9d a3 fd 61 0e d5 f0 a3 3d 5e 4e 1c d1 a1 |.y...a....=^N...|
00000040 52 62 4f 94 e0 14 |RbO...|
[1301 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[1302 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[1303 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1304 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1305 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[1306 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1307 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1308 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1309 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 c7 10 a4 f0 b3 5f 5c 40 a8 d3 dd db b1 db f0 |......_\@.......|
00000010 73 0e 39 00 10 c9 c8 76 95 ec 50 0d be 56 0b ba |s.9....v..P..V..|
[130a 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 86 7a 9f fc 24 fa 75 51 c3 43 5d |0D. T.z..$.uQ.C]|
00000010 0c 81 a5 72 a1 7a 2e ce 92 cd b2 1a 9b b2 02 fc |...r.z..........|
00000020 76 be a3 8b 02 20 08 c1 1b 88 b1 65 48 be 83 5e |v.... .....eH..^|
00000030 b4 79 9d a3 fd 61 0e d5 f0 a3 3d 5e 4e 1c d1 a1 |.y...a....=^N...|
00000040 52 62 4f 94 e0 14 |RbO...|
[130b 01-03 17:55:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[130c 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 3a 87 df 7d 22 16 2e 95 6f 94 2d |0D. =:..}"...o.-|
00000010 df 3d b4 0c f2 1c dd 1f f1 99 71 dc c8 64 2f d5 |.=........q..d/.|
00000020 e0 3e b3 e5 02 20 7a 92 31 b4 c7 b9 0e 53 93 f1 |.>... z.1....S..|
00000030 4d 27 6e ea 6f 17 8e 92 2d 10 74 b6 b3 2f 2f fe |M'n.o...-.t..//.|
00000040 28 26 76 16 51 17 |(&v.Q.|
[130d 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[130e 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[130f 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1310 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1311 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1313 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1312 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1314 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 da 75 fb 49 5f 35 26 14 b6 41 f6 66 f6 c2 dd |..u.I_5&..A.f...|
00000010 9e b5 8a e0 46 28 e3 42 a5 00 d0 2a 99 e1 74 ea |....F(.B...*..t.|
[1315 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 90 e1 bd 3f b2 97 61 af 38 83 |0E.!.....?..a.8.|
00000010 08 fb 81 eb 91 fc f5 cb 46 86 96 ad 8f af 6a 88 |........F.....j.|
00000020 84 8a 14 26 6f 02 20 2a 04 fc 2c 46 d1 ac e5 82 |...&o. *..,F....|
00000030 ec 06 fc 47 87 2f 08 f3 84 67 1d 5e bf bc 8f fc |...G./...g.^....|
00000040 7b 75 50 6e 30 d5 77 |{uPn0.w|
[1316 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[1317 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1318 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1319 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[131a 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[131b 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[131c 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[131d 01-03 17:55:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[131e 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[131f 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1320 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 7c 01 ee 69 ef 8f 3d b1 cb 5d bc 9f 16 14 99 |.|..i..=..].....|
00000010 2f d0 c4 d0 ae 6d 9b 7f 8b 91 37 7c 03 f3 23 22 |/....m....7|..#"|
[1321 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c e4 25 d5 f6 28 9d 9d aa 1a fb df |0D. \.%..(......|
00000010 93 2f 99 b1 19 7c 09 d1 a9 85 76 01 f5 8d b0 ac |./...|....v.....|
00000020 f9 77 53 d1 02 20 64 28 af 15 a4 e5 6b 16 7d 79 |.wS.. d(....k.}y|
00000030 1a 25 4d 47 1e fe 35 57 35 9d b5 e3 ef 62 b6 eb |.%MG..5W5....b..|
00000040 72 44 a1 a3 11 76 |rD...v|
[1322 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1323 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24630 gate 1578074105353700900 evaluation starts
[1324 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24630 signed by 0 principal evaluation starts (used [false])
[1325 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24630 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1326 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1327 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24630 principal evaluation fails
[1328 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24630 gate 1578074105353700900 evaluation fails
[1329 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[132a 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[132b 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[132c 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 7c 01 ee 69 ef 8f 3d b1 cb 5d bc 9f 16 14 99 |.|..i..=..].....|
00000010 2f d0 c4 d0 ae 6d 9b 7f 8b 91 37 7c 03 f3 23 22 |/....m....7|..#"|
[132d 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c e4 25 d5 f6 28 9d 9d aa 1a fb df |0D. \.%..(......|
00000010 93 2f 99 b1 19 7c 09 d1 a9 85 76 01 f5 8d b0 ac |./...|....v.....|
00000020 f9 77 53 d1 02 20 64 28 af 15 a4 e5 6b 16 7d 79 |.wS.. d(....k.}y|
00000030 1a 25 4d 47 1e fe 35 57 35 9d b5 e3 ef 62 b6 eb |.%MG..5W5....b..|
00000040 72 44 a1 a3 11 76 |rD...v|
[132e 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[132f 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24f30 gate 1578074105357218700 evaluation starts
[1330 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24f30 signed by 0 principal evaluation starts (used [false])
[1331 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24f30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1332 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24f30 principal evaluation succeeds for identity 0
[1333 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24f30 gate 1578074105357218700 evaluation succeeds
[1334 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1335 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1336 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1337 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1338 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes
[1339 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[133a 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[133b 01-03 17:55:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 c7 10 a4 f0 b3 5f 5c 40 a8 d3 dd db b1 db f0 |......_\@.......|
00000010 73 0e 39 00 10 c9 c8 76 95 ec 50 0d be 56 0b ba |s.9....v..P..V..|
[133c 01-03 17:55:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 86 7a 9f fc 24 fa 75 51 c3 43 5d |0D. T.z..$.uQ.C]|
00000010 0c 81 a5 72 a1 7a 2e ce 92 cd b2 1a 9b b2 02 fc |...r.z..........|
00000020 76 be a3 8b 02 20 08 c1 1b 88 b1 65 48 be 83 5e |v.... .....eH..^|
00000030 b4 79 9d a3 fd 61 0e d5 f0 a3 3d 5e 4e 1c d1 a1 |.y...a....=^N...|
00000040 52 62 4f 94 e0 14 |RbO...|
[133d 01-03 17:55:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[133e 01-03 17:55:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[133f 01-03 17:55:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1340 01-03 17:55:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1341 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1342 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1343 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1344 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1345 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1346 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1347 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1348 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1349 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[134a 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[134c 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[134e 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[134f 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[134d 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[134b 01-03 17:55:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1350 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1351 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1352 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1353 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1354 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1355 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1356 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6067857700439488091 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[1357 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6067857700439488091 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1358 01-03 17:55:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1359 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[135a 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[135b 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[135c 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[135d 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[135e 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[135f 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1360 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1361 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1362 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1363 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1364 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54eb0 gate 1578074105534727600 evaluation starts
[1365 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54eb0 signed by 0 principal evaluation starts (used [false])
[1366 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54eb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1367 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1368 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54eb0 principal evaluation fails
[1369 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54eb0 gate 1578074105534727600 evaluation fails
[136a 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[136b 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[136c 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[136d 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[136e 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[136f 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1370 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f557b0 gate 1578074105539045500 evaluation starts
[1371 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f557b0 signed by 0 principal evaluation starts (used [false])
[1372 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f557b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1373 01-03 17:55:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f557b0 principal evaluation succeeds for identity 0
[1374 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f557b0 gate 1578074105539045500 evaluation succeeds
[1375 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1376 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1377 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1378 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1379 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[137a 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[137b 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[137c 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[137d 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[137e 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[137f 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1380 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1381 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1382 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1383 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1384 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63210 gate 1578074105544936900 evaluation starts
[1385 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63210 signed by 0 principal evaluation starts (used [false])
[1386 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63210 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1387 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1388 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63210 principal evaluation fails
[1389 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63210 gate 1578074105544936900 evaluation fails
[138a 01-03 17:55:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[138b 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[138c 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[138d 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[138e 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[138f 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1390 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63b10 gate 1578074105554481800 evaluation starts
[1391 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63b10 signed by 0 principal evaluation starts (used [false])
[1392 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63b10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1393 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63b10 principal evaluation succeeds for identity 0
[1394 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f63b10 gate 1578074105554481800 evaluation succeeds
[1395 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1396 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1397 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1398 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1399 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[139a 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[139b 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[139c 01-03 17:55:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[139d 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[139e 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[139f 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[13a0 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[13a1 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[13a2 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[13a3 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[13a4 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[13a5 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[13a6 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[13a7 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f73820 gate 1578074105565857200 evaluation starts
[13a8 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f73820 signed by 0 principal evaluation starts (used [false])
[13a9 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f73820 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[13aa 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f73820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[13ab 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f73820 principal evaluation fails
[13ac 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f73820 gate 1578074105565857200 evaluation fails
[13ad 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[13ae 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[13af 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[13b0 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[13b1 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[13b2 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[13b3 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80120 gate 1578074105568841300 evaluation starts
[13b4 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80120 signed by 0 principal evaluation starts (used [false])
[13b5 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80120 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[13b6 01-03 17:55:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80120 principal evaluation succeeds for identity 0
[13b7 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80120 gate 1578074105568841300 evaluation succeeds
[13b8 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[13b9 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[13ba 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[13bb 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[13bc 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[13bd 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[13be 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[13bf 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[13c0 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13c1 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13c2 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[13c3 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[13c4 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[13c5 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[13c6 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[13c7 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[13c8 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[13c9 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[13ca 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[13cb 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f948e0 gate 1578074105578597800 evaluation starts
[13cc 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f948e0 signed by 0 principal evaluation starts (used [false])
[13cd 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f948e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[13ce 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f948e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[13cf 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f948e0 principal evaluation fails
[13d0 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f948e0 gate 1578074105578597800 evaluation fails
[13d1 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[13d2 01-03 17:55:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[13d3 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[13d4 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[13d5 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[13d6 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[13d7 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f951e0 gate 1578074105581265000 evaluation starts
[13d8 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f951e0 signed by 0 principal evaluation starts (used [false])
[13d9 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f951e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[13da 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f951e0 principal evaluation succeeds for identity 0
[13db 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f951e0 gate 1578074105581265000 evaluation succeeds
[13dc 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[13dd 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[13de 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[13df 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[13e0 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13e1 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[13e2 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13e3 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13e4 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13e5 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[13e6 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[13e7 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[13e8 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[13e9 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[13ea 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[13eb 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[13ec 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[13ed 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[13ee 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaef0 gate 1578074105588534100 evaluation starts
[13ef 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaef0 signed by 0 principal evaluation starts (used [false])
[13f0 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaef0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[13f1 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[13f2 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaef0 principal evaluation fails
[13f3 01-03 17:55:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002faaef0 gate 1578074105588534100 evaluation fails
[13f4 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[13f5 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[13f6 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[13f7 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[13f8 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[13f9 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[13fa 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab7f0 gate 1578074105591877600 evaluation starts
[13fb 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab7f0 signed by 0 principal evaluation starts (used [false])
[13fc 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab7f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[13fd 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab7f0 principal evaluation succeeds for identity 0
[13fe 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fab7f0 gate 1578074105591877600 evaluation succeeds
[13ff 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1400 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1401 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1402 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1403 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1404 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1405 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1406 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1407 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1408 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1409 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[140a 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[140b 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[140c 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[140d 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[140e 01-03 17:55:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[140f 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1410 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7900 gate 1578074105600362900 evaluation starts
[1411 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7900 signed by 0 principal evaluation starts (used [false])
[1412 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7900 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1413 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1414 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7900 principal evaluation fails
[1415 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7900 gate 1578074105600362900 evaluation fails
[1416 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1417 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1418 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1419 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[141a 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[141b 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[141c 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd0200 gate 1578074105603438200 evaluation starts
[141d 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd0200 signed by 0 principal evaluation starts (used [false])
[141e 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd0200 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[141f 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd0200 principal evaluation succeeds for identity 0
[1420 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd0200 gate 1578074105603438200 evaluation succeeds
[1421 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1422 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1423 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1424 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1425 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1426 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1427 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1428 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6067857700439488091 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[1429 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6067857700439488091 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[142a 01-03 17:55:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[142b 01-03 17:55:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[142c 01-03 17:55:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[142d 01-03 17:55:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[142e 01-03 17:55:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[142f 01-03 17:55:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15380877306049736660 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1430 01-03 17:55:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15380877306049736660 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1431 01-03 17:55:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1432 01-03 17:55:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1433 01-03 17:55:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1434 01-03 17:55:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1435 01-03 17:55:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1436 01-03 17:55:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1437 01-03 17:55:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1438 01-03 17:55:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1439 01-03 17:55:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[143a 01-03 17:55:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[143b 01-03 17:55:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[143c 01-03 17:55:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[143d 01-03 17:55:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[143e 01-03 17:55:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[143f 01-03 17:55:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[1440 01-03 17:55:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[1441 01-03 17:55:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510051801
[1442 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D68D1C60533AA08752628E983314DB0AA0D6C7B718806BC47F87C9FFA124742F
[1443 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[1444 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1445 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1446 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1447 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1448 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1449 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[144a 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[144b 01-03 17:55:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[144c 01-03 17:55:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[144d 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[144e 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[144f 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1450 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1451 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 4a 3b c3 35 68 82 dd de b7 ca 61 1b 38 2b ad |.J;.5h.....a.8+.|
00000010 d9 fe 28 74 cc a9 db f2 22 8e 02 20 62 f5 61 6c |..(t....".. b.al|
[1452 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea c5 35 41 fb 08 5b a9 3e 47 7b |0E.!...5A..[.>G{|
00000010 97 44 75 c9 d3 cd 38 5b 23 88 70 fd 61 e2 18 98 |.Du...8[#.p.a...|
00000020 9f 2e c4 85 2d 02 20 40 5d 32 e6 f8 9c f0 87 54 |....-. @]2.....T|
00000030 32 60 41 46 11 3d 98 08 e1 26 7d 33 1d a0 43 2a |2`AF.=...&}3..C*|
00000040 cc 3f f7 e2 33 f8 85 |.?..3..|
[1453 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1454 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 46 a5 c7 5c 8f e6 d0 14 1c 94 |0E.!..F..\......|
00000010 5c f7 7c 40 42 ab c3 41 b5 20 c6 e1 50 ed 57 c6 |\.|@B..A. ..P.W.|
00000020 60 fc 8b 4a 28 02 20 68 90 b2 e8 82 e1 9a 45 38 |`..J(. h......E8|
00000030 21 66 a6 cd 11 62 af 97 30 55 ae 76 2b 54 e2 16 |!f...b..0U.v+T..|
00000040 d9 94 d1 c3 3a da b4 |....:..|
[1455 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1456 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[1457 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28
[1458 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28
[1459 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[145a 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[145b 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[145c 01-03 17:55:06.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[145d 01-03 17:55:06.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[145e 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[145f 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1460 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1461 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1462 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1463 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1464 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1465 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1466 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1467 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1468 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1469 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[146a 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[146b 01-03 17:55:06.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[146c 01-03 17:55:06.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[146d 01-03 17:55:06.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[146e 01-03 17:55:06.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[146f 01-03 17:55:06.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1470 01-03 17:55:06.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1471 01-03 17:55:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:1476653520896066095 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1472 01-03 17:55:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1476653520896066095 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1473 01-03 17:55:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1474 01-03 17:55:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1475 01-03 17:55:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1476 01-03 17:55:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1477 01-03 17:55:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1478 01-03 17:55:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1479 01-03 17:55:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 72 3d c3 d0 27 80 d0 5e 7f 89 4e 09 25 ef dd |.r=..'..^..N.%..|
00000010 d9 ac db 2d 07 13 a7 8e 15 6d c7 73 5a 85 da e7 |...-.....m.sZ...|
[147a 01-03 17:55:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 7f 59 07 45 42 f4 21 a7 94 e4 48 |0D. ^.Y.EB.!...H|
00000010 95 7c f3 a7 fe 4e 21 d5 2b 70 15 0e 46 cf 14 52 |.|...N!.+p..F..R|
00000020 da 4b 95 e5 02 20 01 53 9c 63 64 83 71 fc e3 69 |.K... .S.cd.q..i|
00000030 d1 12 23 45 31 bc ef 91 46 59 44 61 4c 02 e1 31 |..#E1...FYDaL..1|
00000040 90 12 d8 c9 09 ba |......|
[147b 01-03 17:55:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[147c 01-03 17:55:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 7c af 2b 8f 62 29 68 18 2b 53 91 |0D. Q|.+.b)h.+S.|
00000010 1f a5 a3 21 e3 f6 c8 44 f8 70 5e 58 0a 7e a2 8e |...!...D.p^X.~..|
00000020 75 87 ed 3f 02 20 4e bd fe cc fb c8 7e d8 6b 1f |u..?. N.....~.k.|
00000030 aa 93 d0 ff b2 67 a2 73 c5 64 c8 b0 31 e5 54 6f |.....g.s.d..1.To|
00000040 dc a3 6c 09 57 4d |..l.WM|
[147d 01-03 17:55:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[147e 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[147f 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29
[1480 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29
[1481 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[1482 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1483 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1484 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1485 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1486 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1487 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1488 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[1489 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[148a 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[148b 01-03 17:55:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[148c 01-03 17:55:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[148d 01-03 17:55:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[148e 01-03 17:55:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[148f 01-03 17:55:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[1490 01-03 17:55:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1491 01-03 17:55:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1492 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1493 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1494 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1495 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1496 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1497 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1498 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 5c 7d 43 14 bd 68 6c eb d8 61 e8 53 1b 94 ea |.\}C..hl..a.S...|
00000010 70 4b 0d b0 b5 5a 13 8f 51 a3 46 58 38 a9 40 72 |pK...Z..Q.FX8.@r|
[1499 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 49 3b 11 1b af 8b de 6a bc 01 |0E.!..I;.....j..|
00000010 75 07 c4 cb 72 da 5c 18 13 86 ad b5 66 c9 e7 ed |u...r.\.....f...|
00000020 e8 52 ac 37 70 02 20 4d 89 ef 2e 1f 61 13 a9 b9 |.R.7p. M....a...|
00000030 2d 9f 81 f1 41 9f 7f 3f 8c 1f 4d 48 76 1e a5 00 |-...A..?..MHv...|
00000040 08 d8 5f 51 d2 ab f4 |.._Q...|
[149a 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[149b 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030615b0 gate 1578074108046994700 evaluation starts
[149c 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030615b0 signed by 0 principal evaluation starts (used [false])
[149d 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030615b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[149e 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030615b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[149f 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030615b0 principal evaluation fails
[14a0 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030615b0 gate 1578074108046994700 evaluation fails
[14a1 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[14a2 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[14a3 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[14a4 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 5c 7d 43 14 bd 68 6c eb d8 61 e8 53 1b 94 ea |.\}C..hl..a.S...|
00000010 70 4b 0d b0 b5 5a 13 8f 51 a3 46 58 38 a9 40 72 |pK...Z..Q.FX8.@r|
[14a5 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 49 3b 11 1b af 8b de 6a bc 01 |0E.!..I;.....j..|
00000010 75 07 c4 cb 72 da 5c 18 13 86 ad b5 66 c9 e7 ed |u...r.\.....f...|
00000020 e8 52 ac 37 70 02 20 4d 89 ef 2e 1f 61 13 a9 b9 |.R.7p. M....a...|
00000030 2d 9f 81 f1 41 9f 7f 3f 8c 1f 4d 48 76 1e a5 00 |-...A..?..MHv...|
00000040 08 d8 5f 51 d2 ab f4 |.._Q...|
[14a6 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14a7 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003061eb0 gate 1578074108049879800 evaluation starts
[14a8 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003061eb0 signed by 0 principal evaluation starts (used [false])
[14a9 01-03 17:55:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003061eb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[14aa 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003061eb0 principal evaluation succeeds for identity 0
[14ab 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003061eb0 gate 1578074108049879800 evaluation succeeds
[14ac 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[14ad 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[14ae 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[14af 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[14b0 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[14b1 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}
[14b2 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26
[14b3 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26
[14b4 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[14b5 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14b7 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14b6 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[14b9 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[14ba 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14bb 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14bc 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14bd 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14be 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14bf 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14c0 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14c1 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[14c2 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14c3 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[14c4 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[14c5 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14c6 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[14c7 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14b8 01-03 17:55:08.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14c8 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[14ca 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14c9 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14cb 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[14cc 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14cd 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[14ce 01-03 17:55:08.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14cf 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[14d0 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[14d1 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14d2 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[14d3 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[14d4 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14d5 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[14d6 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[14d7 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[14d8 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[14d9 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[14da 01-03 17:55:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[14db 01-03 17:55:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 a0 d8 eb 65 aa 1f d7 03 22 7c 9b 22 08 70 43 |$...e...."|.".pC|
00000010 85 70 ba d3 2d 5e 6f 62 9c a5 82 48 aa 6a 5f f0 |.p..-^ob...H.j_.|
[14dc 01-03 17:55:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc ee 95 b5 d0 19 0a 48 ee 7f 20 |0E.!........H.. |
00000010 e9 a9 5e d8 33 2d c2 0d b5 01 66 f2 42 5c 33 22 |..^.3-....f.B\3"|
00000020 c1 51 1c 9d 14 02 20 1a fb 28 36 ab 09 d1 c0 06 |.Q.... ..(6.....|
00000030 c6 58 8d 36 5d 3e 19 c2 47 a2 61 9f f4 7e be d1 |.X.6]>..G.a..~..|
00000040 3d 27 94 6d 04 f1 8e |='.m...|
[14dd 01-03 17:55:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14de 01-03 17:55:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309a750 gate 1578074108106285800 evaluation starts
[14df 01-03 17:55:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309a750 signed by 0 principal evaluation starts (used [false])
[14e0 01-03 17:55:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309a750 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[14e1 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309a750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[14e2 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309a750 principal evaluation fails
[14e3 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309a750 gate 1578074108106285800 evaluation fails
[14e4 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[14e5 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[14e6 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[14e7 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 a0 d8 eb 65 aa 1f d7 03 22 7c 9b 22 08 70 43 |$...e...."|.".pC|
00000010 85 70 ba d3 2d 5e 6f 62 9c a5 82 48 aa 6a 5f f0 |.p..-^ob...H.j_.|
[14e8 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc ee 95 b5 d0 19 0a 48 ee 7f 20 |0E.!........H.. |
00000010 e9 a9 5e d8 33 2d c2 0d b5 01 66 f2 42 5c 33 22 |..^.3-....f.B\3"|
00000020 c1 51 1c 9d 14 02 20 1a fb 28 36 ab 09 d1 c0 06 |.Q.... ..(6.....|
00000030 c6 58 8d 36 5d 3e 19 c2 47 a2 61 9f f4 7e be d1 |.X.6]>..G.a..~..|
00000040 3d 27 94 6d 04 f1 8e |='.m...|
[14e9 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14ea 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309b050 gate 1578074108115729800 evaluation starts
[14eb 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309b050 signed by 0 principal evaluation starts (used [false])
[14ec 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309b050 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[14ed 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309b050 principal evaluation succeeds for identity 0
[14ee 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309b050 gate 1578074108115729800 evaluation succeeds
[14ef 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[14f0 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[14f1 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[14f2 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[14f3 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[14f4 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}
[14f5 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28
[14f6 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28
[14f7 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[14f8 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14f9 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14fa 01-03 17:55:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14fb 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14fc 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14fd 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14fe 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14ff 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1500 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1501 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1502 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1503 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1504 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1505 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1506 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1507 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1508 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1509 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[150a 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[150b 01-03 17:55:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[150c 01-03 17:55:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[150d 01-03 17:55:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[150f 01-03 17:55:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[150e 01-03 17:55:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1510 01-03 17:55:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1511 01-03 17:55:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1512 01-03 17:55:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151019
[1513 01-03 17:55:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 91C6DD2005C9878C3715D27527F462886F0792A49212433F67E3B2E0D7106F9E
[1514 01-03 17:55:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1515 01-03 17:55:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1516 01-03 17:55:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[1517 01-03 17:55:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1518 01-03 17:55:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1519 01-03 17:55:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[151a 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[151b 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[151c 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[151d 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[1520 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[151e 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1521 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[1522 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[151f 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1523 01-03 17:55:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1524 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:18132545392635941993 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1525 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:18132545392635941993 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1526 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:18132545392635941993 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1527 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1528 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1529 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[152a 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[152b 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[152c 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[152d 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[152e 01-03 17:55:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[152f 01-03 17:55:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:12908346741128647245 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1530 01-03 17:55:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:12908346741128647245 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1531 01-03 17:55:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12908346741128647245 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1532 01-03 17:55:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1533 01-03 17:55:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1534 01-03 17:55:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1535 01-03 17:55:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1536 01-03 17:55:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1537 01-03 17:55:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1538 01-03 17:55:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1539 01-03 17:55:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[153a 01-03 17:55:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[153b 01-03 17:55:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[153c 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[153d 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[153e 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[153f 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1540 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1541 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1542 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1543 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1544 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1545 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1546 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 0a 58 fe 33 ba bb 12 75 01 2c 1e e6 27 04 d3 |..X.3...u.,..'..|
00000010 87 cb 25 66 c6 52 6e 11 e7 1c a8 62 20 af 5b 7f |..%f.Rn....b .[.|
[1547 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 92 b9 a0 9c 2d 0b 7a 3b 18 80 |0E.!......-.z;..|
00000010 dd 51 8d 2e 4d 1c ce 24 3e 4f 51 ee 7c 3d b0 a4 |.Q..M..$>OQ.|=..|
00000020 5a d6 39 16 1e 02 20 23 ba 69 36 3a 89 db cf e9 |Z.9... #.i6:....|
00000030 e9 20 28 77 0d e2 f5 8b 3f dc fc 6d 7f 93 3d 6e |. (w....?..m..=n|
00000040 43 ba 26 ea 08 2f 35 |C.&../5|
[1548 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1549 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192600 gate 1578074109099353000 evaluation starts
[154a 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192600 signed by 0 principal evaluation starts (used [false])
[154b 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192600 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[154c 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[154d 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192600 principal evaluation fails
[154e 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192600 gate 1578074109099353000 evaluation fails
[154f 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1550 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1551 01-03 17:55:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1552 01-03 17:55:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 0a 58 fe 33 ba bb 12 75 01 2c 1e e6 27 04 d3 |..X.3...u.,..'..|
00000010 87 cb 25 66 c6 52 6e 11 e7 1c a8 62 20 af 5b 7f |..%f.Rn....b .[.|
[1553 01-03 17:55:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 92 b9 a0 9c 2d 0b 7a 3b 18 80 |0E.!......-.z;..|
00000010 dd 51 8d 2e 4d 1c ce 24 3e 4f 51 ee 7c 3d b0 a4 |.Q..M..$>OQ.|=..|
00000020 5a d6 39 16 1e 02 20 23 ba 69 36 3a 89 db cf e9 |Z.9... #.i6:....|
00000030 e9 20 28 77 0d e2 f5 8b 3f dc fc 6d 7f 93 3d 6e |. (w....?..m..=n|
00000040 43 ba 26 ea 08 2f 35 |C.&../5|
[1554 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1555 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192f00 gate 1578074109113566800 evaluation starts
[1556 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192f00 signed by 0 principal evaluation starts (used [false])
[1557 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192f00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1558 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192f00 principal evaluation succeeds for identity 0
[1559 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003192f00 gate 1578074109113566800 evaluation succeeds
[155a 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[155b 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[155c 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[155d 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[155e 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes
[155f 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes]}
[1560 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29
[1561 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29
[1562 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1563 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1564 01-03 17:55:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1565 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1566 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1567 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1568 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1569 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[156a 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[156b 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[156c 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[156d 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[156e 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[156f 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1570 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1571 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1572 01-03 17:55:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1573 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1574 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1575 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1576 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1577 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1578 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1579 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[157a 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 2b 3d 97 dd b9 63 08 85 f5 ed d1 ed 2c 66 93 |.+=...c......,f.|
00000010 88 64 a0 13 df 14 e1 05 8a 1f c8 52 90 df 70 4f |.d.........R..pO|
[157b 01-03 17:55:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 6f ca 5a 15 92 ca e1 78 87 82 |0E.!..o.Z....x..|
00000010 92 1a ef c9 65 6b 21 5c 7f 7c 7b c5 fe d5 51 44 |....ek!\.|{...QD|
00000020 34 83 8f 04 f9 02 20 54 57 69 cd 70 bf 56 19 10 |4..... TWi.p.V..|
00000030 b6 1e a2 01 d8 44 76 e3 28 1f 57 34 e1 5e 8c 2d |.....Dv.(.W4.^.-|
00000040 8a 16 54 59 4e 02 4b |..TYN.K|
[157c 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[157d 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dcc30 gate 1578074109141039500 evaluation starts
[157e 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dcc30 signed by 0 principal evaluation starts (used [false])
[157f 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dcc30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1580 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dcc30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1581 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dcc30 principal evaluation fails
[1582 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dcc30 gate 1578074109141039500 evaluation fails
[1583 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1584 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1585 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1586 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 2b 3d 97 dd b9 63 08 85 f5 ed d1 ed 2c 66 93 |.+=...c......,f.|
00000010 88 64 a0 13 df 14 e1 05 8a 1f c8 52 90 df 70 4f |.d.........R..pO|
[1587 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 6f ca 5a 15 92 ca e1 78 87 82 |0E.!..o.Z....x..|
00000010 92 1a ef c9 65 6b 21 5c 7f 7c 7b c5 fe d5 51 44 |....ek!\.|{...QD|
00000020 34 83 8f 04 f9 02 20 54 57 69 cd 70 bf 56 19 10 |4..... TWi.p.V..|
00000030 b6 1e a2 01 d8 44 76 e3 28 1f 57 34 e1 5e 8c 2d |.....Dv.(.W4.^.-|
00000040 8a 16 54 59 4e 02 4b |..TYN.K|
[1588 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1589 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd530 gate 1578074109141833600 evaluation starts
[158a 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd530 signed by 0 principal evaluation starts (used [false])
[158b 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd530 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[158c 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd530 principal evaluation succeeds for identity 0
[158d 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd530 gate 1578074109141833600 evaluation succeeds
[158e 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[158f 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1590 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1591 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1592 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[1593 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes]}
[1594 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27
[1595 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27
[1596 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1597 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1598 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1599 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[159a 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[159b 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[159c 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[159d 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[159e 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[159f 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[15a0 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[15a1 01-03 17:55:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15a2 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[15a3 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5602021055203620865 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[15a4 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[15a5 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5602021055203620865 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[15a6 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15a7 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9159318110942787892 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[15a8 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[15aa 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3851650558178076202 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[15ab 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3851650558178076202 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[15ac 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15a9 01-03 17:55:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9159318110942787892 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[15ad 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15ae 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3851650558178076202 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[15af 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3851650558178076202 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[15b0 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15b1 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9159318110942787892 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[15b2 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9159318110942787892 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[15b3 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9159318110942787892 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[15b4 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15b5 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5602021055203620865 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[15b6 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5602021055203620865 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[15b7 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5602021055203620865 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[15b8 01-03 17:55:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15b9 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315101A
[15ba 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ED060FDA4B7C5427EB788DE6DB21C44A14A62596C4C8C86D5EB9BF0D7651E4A4
[15bb 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[15bc 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[15bd 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15be 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[15bf 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15c0 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[15c1 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[15c2 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[15c3 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15c4 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[15c5 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15c6 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[15c7 01-03 17:55:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15c8 01-03 17:55:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[15c9 01-03 17:55:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[15ca 01-03 17:55:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15cb 01-03 17:55:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[15cc 01-03 17:55:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[15cd 01-03 17:55:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15ce 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[15cf 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[15d0 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[15d1 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[15d2 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[15d3 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[15d4 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[15d5 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[15d6 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 2b 3d 97 dd b9 63 08 85 f5 ed d1 ed 2c 66 93 |.+=...c......,f.|
00000010 88 64 a0 13 df 14 e1 05 8a 1f c8 52 90 df 70 4f |.d.........R..pO|
[15d7 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 6f ca 5a 15 92 ca e1 78 87 82 |0E.!..o.Z....x..|
00000010 92 1a ef c9 65 6b 21 5c 7f 7c 7b c5 fe d5 51 44 |....ek!\.|{...QD|
00000020 34 83 8f 04 f9 02 20 54 57 69 cd 70 bf 56 19 10 |4..... TWi.p.V..|
00000030 b6 1e a2 01 d8 44 76 e3 28 1f 57 34 e1 5e 8c 2d |.....Dv.(.W4.^.-|
00000040 8a 16 54 59 4e 02 4b |..TYN.K|
[15d8 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[15d9 01-03 17:55:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320db90 gate 1578074109326403200 evaluation starts
[15da 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320db90 signed by 0 principal evaluation starts (used [false])
[15db 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320db90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[15dc 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320db90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[15dd 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320db90 principal evaluation fails
[15de 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320db90 gate 1578074109326403200 evaluation fails
[15df 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[15e0 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[15e1 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[15e2 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 2b 3d 97 dd b9 63 08 85 f5 ed d1 ed 2c 66 93 |.+=...c......,f.|
00000010 88 64 a0 13 df 14 e1 05 8a 1f c8 52 90 df 70 4f |.d.........R..pO|
[15e3 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 6f ca 5a 15 92 ca e1 78 87 82 |0E.!..o.Z....x..|
00000010 92 1a ef c9 65 6b 21 5c 7f 7c 7b c5 fe d5 51 44 |....ek!\.|{...QD|
00000020 34 83 8f 04 f9 02 20 54 57 69 cd 70 bf 56 19 10 |4..... TWi.p.V..|
00000030 b6 1e a2 01 d8 44 76 e3 28 1f 57 34 e1 5e 8c 2d |.....Dv.(.W4.^.-|
00000040 8a 16 54 59 4e 02 4b |..TYN.K|
[15e4 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[15e5 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326e490 gate 1578074109337224700 evaluation starts
[15e6 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326e490 signed by 0 principal evaluation starts (used [false])
[15e7 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326e490 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[15e8 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326e490 principal evaluation succeeds for identity 0
[15e9 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326e490 gate 1578074109337224700 evaluation succeeds
[15ea 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[15eb 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[15ec 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[15ed 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[15ee 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[15ef 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15f0 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[15f1 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 06 0f da 4b 7c 54 27 eb 78 8d e6 db 21 c4 4a |....K|T'.x...!.J|
00000010 14 a6 25 96 c4 c8 c8 6d 5e b9 bf 0d 76 51 e4 a4 |..%....m^...vQ..|
[15f2 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e fa 20 5d 5f da be ce a9 f1 de 82 |0D. .. ]_.......|
00000010 74 07 5f 9e 32 69 34 76 59 79 57 13 98 7f 66 ca |t._.2i4vYyW...f.|
00000020 63 7a f2 86 02 20 14 68 8c 65 61 ac 76 01 5e 9a |cz... .h.ea.v.^.|
00000030 ce fa 2b de 19 58 bd f9 fe 59 5a ad 75 1d 8f 5e |..+..X...YZ.u..^|
00000040 6b e3 dc 39 17 36 |k..9.6|
[15f3 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[15f4 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[15f5 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15f6 01-03 17:55:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[15f7 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 72 3d c3 d0 27 80 d0 5e 7f 89 4e 09 25 ef dd |.r=..'..^..N.%..|
00000010 d9 ac db 2d 07 13 a7 8e 15 6d c7 73 5a 85 da e7 |...-.....m.sZ...|
[15f8 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 7f 59 07 45 42 f4 21 a7 94 e4 48 |0D. ^.Y.EB.!...H|
00000010 95 7c f3 a7 fe 4e 21 d5 2b 70 15 0e 46 cf 14 52 |.|...N!.+p..F..R|
00000020 da 4b 95 e5 02 20 01 53 9c 63 64 83 71 fc e3 69 |.K... .S.cd.q..i|
00000030 d1 12 23 45 31 bc ef 91 46 59 44 61 4c 02 e1 31 |..#E1...FYDaL..1|
00000040 90 12 d8 c9 09 ba |......|
[15f9 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[15fa 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15fb 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15fc 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[15fd 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[15fe 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15ff 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1600 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1601 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1602 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1603 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1604 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1605 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1606 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 0a 58 fe 33 ba bb 12 75 01 2c 1e e6 27 04 d3 |..X.3...u.,..'..|
00000010 87 cb 25 66 c6 52 6e 11 e7 1c a8 62 20 af 5b 7f |..%f.Rn....b .[.|
[1607 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 92 b9 a0 9c 2d 0b 7a 3b 18 80 |0E.!......-.z;..|
00000010 dd 51 8d 2e 4d 1c ce 24 3e 4f 51 ee 7c 3d b0 a4 |.Q..M..$>OQ.|=..|
00000020 5a d6 39 16 1e 02 20 23 ba 69 36 3a 89 db cf e9 |Z.9... #.i6:....|
00000030 e9 20 28 77 0d e2 f5 8b 3f dc fc 6d 7f 93 3d 6e |. (w....?..m..=n|
00000040 43 ba 26 ea 08 2f 35 |C.&../5|
[1608 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1609 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327f6f0 gate 1578074109343526000 evaluation starts
[160a 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327f6f0 signed by 0 principal evaluation starts (used [false])
[160b 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327f6f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[160c 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327f6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[160d 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327f6f0 principal evaluation fails
[160e 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327f6f0 gate 1578074109343526000 evaluation fails
[160f 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1610 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1611 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1612 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 0a 58 fe 33 ba bb 12 75 01 2c 1e e6 27 04 d3 |..X.3...u.,..'..|
00000010 87 cb 25 66 c6 52 6e 11 e7 1c a8 62 20 af 5b 7f |..%f.Rn....b .[.|
[1613 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 92 b9 a0 9c 2d 0b 7a 3b 18 80 |0E.!......-.z;..|
00000010 dd 51 8d 2e 4d 1c ce 24 3e 4f 51 ee 7c 3d b0 a4 |.Q..M..$>OQ.|=..|
00000020 5a d6 39 16 1e 02 20 23 ba 69 36 3a 89 db cf e9 |Z.9... #.i6:....|
00000030 e9 20 28 77 0d e2 f5 8b 3f dc fc 6d 7f 93 3d 6e |. (w....?..m..=n|
00000040 43 ba 26 ea 08 2f 35 |C.&../5|
[1614 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1615 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327fff0 gate 1578074109344922300 evaluation starts
[1616 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327fff0 signed by 0 principal evaluation starts (used [false])
[1617 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327fff0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1618 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327fff0 principal evaluation succeeds for identity 0
[1619 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327fff0 gate 1578074109344922300 evaluation succeeds
[161a 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[161b 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[161c 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[161d 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[161e 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes
[161f 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1620 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[1621 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1622 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 72 3d c3 d0 27 80 d0 5e 7f 89 4e 09 25 ef dd |.r=..'..^..N.%..|
00000010 d9 ac db 2d 07 13 a7 8e 15 6d c7 73 5a 85 da e7 |...-.....m.sZ...|
[1623 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 7f 59 07 45 42 f4 21 a7 94 e4 48 |0D. ^.Y.EB.!...H|
00000010 95 7c f3 a7 fe 4e 21 d5 2b 70 15 0e 46 cf 14 52 |.|...N!.+p..F..R|
00000020 da 4b 95 e5 02 20 01 53 9c 63 64 83 71 fc e3 69 |.K... .S.cd.q..i|
00000030 d1 12 23 45 31 bc ef 91 46 59 44 61 4c 02 e1 31 |..#E1...FYDaL..1|
00000040 90 12 d8 c9 09 ba |......|
[1624 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1625 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1626 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1627 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 06 0f da 4b 7c 54 27 eb 78 8d e6 db 21 c4 4a |....K|T'.x...!.J|
00000010 14 a6 25 96 c4 c8 c8 6d 5e b9 bf 0d 76 51 e4 a4 |..%....m^...vQ..|
[1628 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e fa 20 5d 5f da be ce a9 f1 de 82 |0D. .. ]_.......|
00000010 74 07 5f 9e 32 69 34 76 59 79 57 13 98 7f 66 ca |t._.2i4vYyW...f.|
00000020 63 7a f2 86 02 20 14 68 8c 65 61 ac 76 01 5e 9a |cz... .h.ea.v.^.|
00000030 ce fa 2b de 19 58 bd f9 fe 59 5a ad 75 1d 8f 5e |..+..X...YZ.u..^|
00000040 6b e3 dc 39 17 36 |k..9.6|
[1629 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[162a 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[162b 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[162c 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[162d 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[162e 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[162f 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 06 0f da 4b 7c 54 27 eb 78 8d e6 db 21 c4 4a |....K|T'.x...!.J|
00000010 14 a6 25 96 c4 c8 c8 6d 5e b9 bf 0d 76 51 e4 a4 |..%....m^...vQ..|
[1630 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e fa 20 5d 5f da be ce a9 f1 de 82 |0D. .. ]_.......|
00000010 74 07 5f 9e 32 69 34 76 59 79 57 13 98 7f 66 ca |t._.2i4vYyW...f.|
00000020 63 7a f2 86 02 20 14 68 8c 65 61 ac 76 01 5e 9a |cz... .h.ea.v.^.|
00000030 ce fa 2b de 19 58 bd f9 fe 59 5a ad 75 1d 8f 5e |..+..X...YZ.u..^|
00000040 6b e3 dc 39 17 36 |k..9.6|
[1631 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1632 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 63 b4 87 6b 8f 4c 4f a0 6b d8 |0E.!..c..k.LO.k.|
00000010 72 58 19 2d 71 36 50 eb 83 fd 67 94 40 ca 3b ac |rX.-q6P...g.@.;.|
00000020 c4 6a 5a 74 d6 02 20 69 64 de 71 02 42 61 ee ef |.jZt.. id.q.Ba..|
00000030 91 f5 a3 31 5d 32 34 7e 61 e8 a7 e3 8b 5a cf d7 |...1]24~a....Z..|
00000040 66 be 41 be 4a 2a 6a |f.A.J*j|
[1633 01-03 17:55:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1634 01-03 17:55:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1635 01-03 17:55:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1636 01-03 17:55:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1637 01-03 17:55:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1638 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1639 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[163a 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[163b 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[163c 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[163d 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[163e 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[163f 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1640 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1641 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1642 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1643 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1644 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1645 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1646 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1647 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1648 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1649 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[164a 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[164b 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[164c 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[164d 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[164e 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[164f 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4860 gate 1578074109519661800 evaluation starts
[1650 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4860 signed by 0 principal evaluation starts (used [false])
[1651 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4860 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1652 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1653 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4860 principal evaluation fails
[1654 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4860 gate 1578074109519661800 evaluation fails
[1655 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1656 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1657 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1658 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1659 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[165a 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[165b 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d5160 gate 1578074109521375600 evaluation starts
[165c 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d5160 signed by 0 principal evaluation starts (used [false])
[165d 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d5160 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[165e 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d5160 principal evaluation succeeds for identity 0
[165f 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d5160 gate 1578074109521375600 evaluation succeeds
[1660 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1661 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1662 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1663 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1664 01-03 17:55:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1665 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1666 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1667 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1668 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1669 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[166a 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[166b 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[166c 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[166d 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[166e 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[166f 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1670 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1671 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1672 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ed270 gate 1578074109527133600 evaluation starts
[1673 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ed270 signed by 0 principal evaluation starts (used [false])
[1674 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ed270 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1675 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ed270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1676 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ed270 principal evaluation fails
[1677 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ed270 gate 1578074109527133600 evaluation fails
[1678 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1679 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[167a 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[167b 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[167c 01-03 17:55:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[167d 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[167e 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032edb70 gate 1578074109531439500 evaluation starts
[167f 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032edb70 signed by 0 principal evaluation starts (used [false])
[1680 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032edb70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1681 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032edb70 principal evaluation succeeds for identity 0
[1682 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1684 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1685 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1683 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032edb70 gate 1578074109531439500 evaluation succeeds
[1686 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1687 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1688 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1689 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[168a 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[168c 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[168d 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[168b 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[168f 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1690 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2616948027981510270 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[1691 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2616948027981510270 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1692 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[168e 01-03 17:55:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1693 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1694 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1695 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1696 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1697 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1698 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1699 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[169a 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[169b 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[169c 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[169d 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[169e 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[169f 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[16a0 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[16a1 01-03 17:55:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[16a2 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348bc0 gate 1578074109551679500 evaluation starts
[16a3 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348bc0 signed by 0 principal evaluation starts (used [false])
[16a4 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348bc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[16a5 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[16a6 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348bc0 principal evaluation fails
[16a7 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348bc0 gate 1578074109551679500 evaluation fails
[16a8 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[16a9 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[16aa 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[16ab 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[16ac 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[16ad 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[16ae 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033494c0 gate 1578074109554808700 evaluation starts
[16af 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033494c0 signed by 0 principal evaluation starts (used [false])
[16b0 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033494c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[16b1 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033494c0 principal evaluation succeeds for identity 0
[16b2 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033494c0 gate 1578074109554808700 evaluation succeeds
[16b3 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[16b4 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[16b5 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[16b6 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[16b7 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16b8 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16b9 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[16ba 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[16bb 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[16bc 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[16bd 01-03 17:55:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[16be 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[16bf 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[16c0 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[16c1 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[16c2 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335af20 gate 1578074109562572900 evaluation starts
[16c3 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335af20 signed by 0 principal evaluation starts (used [false])
[16c4 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335af20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[16c5 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335af20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[16c6 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335af20 principal evaluation fails
[16c7 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335af20 gate 1578074109562572900 evaluation fails
[16c8 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[16c9 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[16ca 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[16cb 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[16cc 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[16cd 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[16ce 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b820 gate 1578074109567076800 evaluation starts
[16cf 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b820 signed by 0 principal evaluation starts (used [false])
[16d0 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b820 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[16d1 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b820 principal evaluation succeeds for identity 0
[16d2 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b820 gate 1578074109567076800 evaluation succeeds
[16d3 01-03 17:55:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[16d4 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[16d5 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[16d6 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[16d7 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16d8 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[16d9 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16da 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16db 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16dc 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[16dd 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[16de 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[16df 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[16e0 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[16e1 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[16e2 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[16e3 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[16e4 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[16e5 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385530 gate 1578074109578005600 evaluation starts
[16e6 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385530 signed by 0 principal evaluation starts (used [false])
[16e7 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385530 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[16e8 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[16e9 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385530 principal evaluation fails
[16ea 01-03 17:55:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385530 gate 1578074109578005600 evaluation fails
[16eb 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[16ec 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[16ed 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[16ee 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[16ef 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[16f0 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[16f1 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e30 gate 1578074109582478500 evaluation starts
[16f2 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e30 signed by 0 principal evaluation starts (used [false])
[16f3 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[16f4 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e30 principal evaluation succeeds for identity 0
[16f5 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e30 gate 1578074109582478500 evaluation succeeds
[16f6 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[16f7 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[16f8 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[16f9 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[16fa 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[16fb 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[16fc 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[16fd 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[16fe 01-03 17:55:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16ff 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1700 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1701 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1702 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1703 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1704 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1705 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1706 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1707 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1708 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1709 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bc5f0 gate 1578074109593272200 evaluation starts
[170a 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bc5f0 signed by 0 principal evaluation starts (used [false])
[170b 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bc5f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[170c 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bc5f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[170d 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bc5f0 principal evaluation fails
[170e 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bc5f0 gate 1578074109593272200 evaluation fails
[170f 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1710 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1711 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1712 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1713 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1714 01-03 17:55:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1715 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bcef0 gate 1578074109600133100 evaluation starts
[1716 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bcef0 signed by 0 principal evaluation starts (used [false])
[1717 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bcef0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1718 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bcef0 principal evaluation succeeds for identity 0
[1719 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bcef0 gate 1578074109600133100 evaluation succeeds
[171a 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[171b 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[171c 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[171d 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[171e 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[171f 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2616948027981510270 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[1720 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2616948027981510270 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[1721 01-03 17:55:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1722 01-03 17:55:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[1723 01-03 17:55:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1724 01-03 17:55:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1725 01-03 17:55:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1726 01-03 17:55:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8160481291921094343 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1727 01-03 17:55:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8160481291921094343 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1728 01-03 17:55:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1729 01-03 17:55:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[172a 01-03 17:55:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[172b 01-03 17:55:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[172c 01-03 17:55:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[172d 01-03 17:55:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[172e 01-03 17:55:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[172f 01-03 17:55:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1730 01-03 17:55:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1731 01-03 17:55:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1732 01-03 17:55:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1733 01-03 17:55:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1734 01-03 17:55:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1735 01-03 17:55:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1736 01-03 17:55:11.53 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[1737 01-03 17:55:11.53 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[1738 01-03 17:55:11.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510061801
[1739 01-03 17:55:11.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 21B5F3A9FE8C51D5F5E71D69672A3E0A26592B7319C4DD238F46F957A14CE2A1
[173a 01-03 17:55:11.53 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[173b 01-03 17:55:11.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[173c 01-03 17:55:11.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[173d 01-03 17:55:11.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[173e 01-03 17:55:11.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[173f 01-03 17:55:11.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1740 01-03 17:55:11.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1742 01-03 17:55:11.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1741 01-03 17:55:11.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[1743 01-03 17:55:11.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1744 01-03 17:55:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1745 01-03 17:55:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1746 01-03 17:55:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1747 01-03 17:55:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1748 01-03 17:55:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 59 0a d0 bd cb ce 7c 0c 27 58 f3 b7 cb 05 ad |.Y.....|.'X.....|
00000010 5a e7 d9 e7 55 14 8e 38 5b 99 69 ab 89 0c f8 3f |Z...U..8[.i....?|
[1749 01-03 17:55:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 51 ff eb 7c 92 5b 55 29 a8 bf 96 |0D. .Q..|.[U)...|
00000010 a3 f2 26 fe 52 12 8f 23 4e 4c 94 30 67 ed 3a c7 |..&.R..#NL.0g.:.|
00000020 9f 81 ae ad 02 20 34 4a 15 28 5b 93 e2 91 93 67 |..... 4J.([....g|
00000030 f4 79 5a 0b 6b 55 48 d5 b7 80 06 36 82 95 ff 6c |.yZ.kUH....6...l|
00000040 a2 cf eb cd 4d 63 |....Mc|
[174a 01-03 17:55:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[174b 01-03 17:55:11.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:3475417758171542004 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[174c 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3475417758171542004 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[174d 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[174e 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[174f 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 5a 3f 25 a9 89 2b 7c 3d b8 0c 87 |0D. mZ?%..+|=...|
00000010 bd 87 82 5a 37 72 fe 33 b4 e6 e2 a4 91 0e 8f 18 |...Z7r.3........|
00000020 b2 47 63 c2 02 20 0f b0 be 38 3b 89 7b 0c 75 e6 |.Gc.. ...8;.{.u.|
00000030 72 5a 28 3f d1 87 fa 4c e0 e6 8e 75 7f d3 f7 8e |rZ(?...L...u....|
00000040 e3 84 7d 73 d9 89 |..}s..|
[1750 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1751 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[1752 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30
[1753 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30
[1754 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[1755 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1756 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1757 01-03 17:55:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1758 01-03 17:55:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1759 01-03 17:55:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[175a 01-03 17:55:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[175b 01-03 17:55:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[175c 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[175d 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[175e 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[175f 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1760 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1761 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1762 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1763 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1764 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1765 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1766 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 d5 05 1e 47 ed 80 93 61 f0 a7 bf 53 6b 12 cd |....G...a...Sk..|
00000010 39 2d 86 c8 21 a5 e1 a3 12 6f b0 30 6d 75 01 5f |9-..!....o.0mu._|
[1767 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 61 fc 53 0e f6 bd 7c ed 66 91 |0E.!..a.S...|.f.|
00000010 9e c5 da 6e f3 1f b3 ac b6 a4 82 24 12 50 54 81 |...n.......$.PT.|
00000020 e5 8c 5a 18 10 02 20 15 68 1b d4 91 3e 39 bd 18 |..Z... .h...>9..|
00000030 14 91 77 6f ba d7 b9 bd f0 66 32 9d 2d 2b 30 75 |..wo.....f2.-+0u|
00000040 7e 02 bd 36 c8 01 8a |~..6...|
[1768 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1769 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 26 7d c0 33 24 d4 13 a2 40 33 |0E.!..&}.3$...@3|
00000010 f2 1a c8 9a 62 3c 30 0f 6f 40 c8 26 28 c6 1d 0f |....b<0.o@.&(...|
00000020 94 d0 1e 32 de 02 20 46 11 27 fe ae e9 b5 cf 20 |...2.. F.'..... |
00000030 c3 09 c0 22 b3 d6 ce 26 19 65 cc 31 42 8d a4 28 |..."...&.e.1B..(|
00000040 f3 9c 3b f6 3e d1 37 |..;.>.7|
[176a 01-03 17:55:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[176b 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[176c 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31
[176d 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31
[176e 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[176f 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1770 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1771 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1772 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1773 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1774 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1775 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers
[1776 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1777 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[1778 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1779 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[177a 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[177b 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[177c 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[177d 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[177e 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[177f 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1780 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1781 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1782 01-03 17:55:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1783 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:16593344808865670844 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1784 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:16593344808865670844 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1785 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16593344808865670844 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1786 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1787 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1788 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1789 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[178a 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[178b 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[178c 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[178d 01-03 17:55:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[178e 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[178f 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[1790 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1791 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[1792 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1793 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1794 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1795 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1796 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1797 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1798 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1799 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[179a 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 15 6d 8b 1f 63 db 4b 99 5d c2 4d e4 f9 39 b5 |..m..c.K.].M..9.|
00000010 b7 fb cf be 2e e1 36 bc f9 ec 72 b4 a0 1b 6e e8 |......6...r...n.|
[179b 01-03 17:55:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a bd 7f ea 0b c6 1d e5 ef df 17 ba |0D. Z...........|
00000010 ba ee 4e b1 80 5e 2d f2 8f 2c cd 38 75 b1 2c 67 |..N..^-..,.8u.,g|
00000020 63 f0 29 d4 02 20 40 75 f9 ec cc 41 e0 a4 e4 9d |c.).. @u...A....|
00000030 e5 3d 2c 81 20 38 a4 8b 8d 51 0d e8 1b 58 87 82 |.=,. 8...Q...X..|
00000040 44 1c b2 b3 bd 64 |D....d|
[179c 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[179d 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346d280 gate 1578074113050637100 evaluation starts
[179e 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346d280 signed by 0 principal evaluation starts (used [false])
[179f 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346d280 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[17a0 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346d280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[17a1 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346d280 principal evaluation fails
[17a2 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346d280 gate 1578074113050637100 evaluation fails
[17a3 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[17a4 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[17a5 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[17a6 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 15 6d 8b 1f 63 db 4b 99 5d c2 4d e4 f9 39 b5 |..m..c.K.].M..9.|
00000010 b7 fb cf be 2e e1 36 bc f9 ec 72 b4 a0 1b 6e e8 |......6...r...n.|
[17a7 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a bd 7f ea 0b c6 1d e5 ef df 17 ba |0D. Z...........|
00000010 ba ee 4e b1 80 5e 2d f2 8f 2c cd 38 75 b1 2c 67 |..N..^-..,.8u.,g|
00000020 63 f0 29 d4 02 20 40 75 f9 ec cc 41 e0 a4 e4 9d |c.).. @u...A....|
00000030 e5 3d 2c 81 20 38 a4 8b 8d 51 0d e8 1b 58 87 82 |.=,. 8...Q...X..|
00000040 44 1c b2 b3 bd 64 |D....d|
[17a8 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[17a9 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346db80 gate 1578074113053510800 evaluation starts
[17aa 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346db80 signed by 0 principal evaluation starts (used [false])
[17ab 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346db80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[17ac 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346db80 principal evaluation succeeds for identity 0
[17ad 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346db80 gate 1578074113053510800 evaluation succeeds
[17ae 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[17af 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[17b0 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[17b1 01-03 17:55:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[17b2 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[17b3 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}
[17b4 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28
[17b5 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28
[17b6 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[17b7 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17b8 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17b9 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17ba 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:14922306641491468623 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[17bb 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14922306641491468623 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[17bc 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14922306641491468623 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[17bd 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17be 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17bf 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17c0 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17c1 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17c2 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17c3 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[17c4 01-03 17:55:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17c5 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17c6 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17c7 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17c8 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17c9 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17ca 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17cb 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[17cc 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17cd 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17ce 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[17cf 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[17d0 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17d1 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[17d2 01-03 17:55:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17d3 01-03 17:55:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[17d4 01-03 17:55:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[17d5 01-03 17:55:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17d6 01-03 17:55:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[17d7 01-03 17:55:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17d8 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[17d9 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17da 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[17db 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17dc 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[17dd 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[17de 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17df 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[17e0 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[17e1 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17e2 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[17e3 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[17e4 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[17e5 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[17e6 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[17e7 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[17e8 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 26 ad b2 0c 33 59 59 a0 1a 20 d3 ae 06 00 2e |.&...3YY.. .....|
00000010 cb 33 c9 6f 7c 60 c7 31 3b 20 b4 26 a0 ac 3b de |.3.o|`.1; .&..;.|
[17e9 01-03 17:55:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 00 0e 03 42 e6 b1 b1 c7 9e e0 c6 |0D. U...B.......|
00000010 f0 17 b3 9c 72 af 29 a6 79 e1 a8 42 ca 5f b2 a0 |....r.).y..B._..|
00000020 a1 5c 4e 52 02 20 30 6c 40 fa b3 b9 f4 b3 2b 11 |.\NR. 0l@.....+.|
00000030 54 1a 3e 97 a8 17 b3 78 8f 4d 7c 92 6b db cb 40 |T.>....x.M|.k..@|
00000040 5f b8 81 9e 3a 99 |_...:.|
[17ea 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[17eb 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bcd30 gate 1578074113100762900 evaluation starts
[17ec 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bcd30 signed by 0 principal evaluation starts (used [false])
[17ed 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bcd30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[17ee 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bcd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[17ef 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bcd30 principal evaluation fails
[17f0 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bcd30 gate 1578074113100762900 evaluation fails
[17f1 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[17f2 01-03 17:55:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[17f3 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[17f4 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 26 ad b2 0c 33 59 59 a0 1a 20 d3 ae 06 00 2e |.&...3YY.. .....|
00000010 cb 33 c9 6f 7c 60 c7 31 3b 20 b4 26 a0 ac 3b de |.3.o|`.1; .&..;.|
[17f5 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 00 0e 03 42 e6 b1 b1 c7 9e e0 c6 |0D. U...B.......|
00000010 f0 17 b3 9c 72 af 29 a6 79 e1 a8 42 ca 5f b2 a0 |....r.).y..B._..|
00000020 a1 5c 4e 52 02 20 30 6c 40 fa b3 b9 f4 b3 2b 11 |.\NR. 0l@.....+.|
00000030 54 1a 3e 97 a8 17 b3 78 8f 4d 7c 92 6b db cb 40 |T.>....x.M|.k..@|
00000040 5f b8 81 9e 3a 99 |_...:.|
[17f6 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[17f7 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bd630 gate 1578074113112933100 evaluation starts
[17f8 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bd630 signed by 0 principal evaluation starts (used [false])
[17f9 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bd630 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[17fa 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bd630 principal evaluation succeeds for identity 0
[17fb 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bd630 gate 1578074113112933100 evaluation succeeds
[17fc 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[17fd 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[17fe 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[17ff 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1801 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1802 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1803 01-03 17:55:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1804 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1800 01-03 17:55:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1805 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}
[1806 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:30
[1807 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:30
[1808 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1809 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[180a 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[180b 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[180d 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[180f 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[1810 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[180c 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[180e 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1811 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1814 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1815 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1816 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1817 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1818 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1819 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 66 a8 63 31 cd ee 61 9e 3c bf c3 4c 0c 5a 74 |sf.c1..a.<..L.Zt|
00000010 35 86 4a c9 4e 40 a5 b3 92 05 9f e3 14 7d 98 22 |5.J.N@.......}."|
[181a 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 00 7f f6 92 34 11 02 19 1b 16 bd |0D. O....4......|
00000010 b6 ff 03 b5 b3 96 d8 0d 4e d1 be 69 9c e8 40 5b |........N..i..@[|
00000020 a7 2c 9b 4b 02 20 40 7f 47 36 be 3d 24 f5 22 06 |.,.K. @.G6.=$.".|
00000030 cb f4 69 e3 a4 b9 23 3e d3 63 6b 3f 18 3d 7d 3f |..i...#>.ck?.=}?|
00000040 84 cf 2c c2 17 43 |..,..C|
[181b 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[181c 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d8740 gate 1578074113148603400 evaluation starts
[181d 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d8740 signed by 0 principal evaluation starts (used [false])
[181e 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d8740 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[181f 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d8740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1820 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d8740 principal evaluation fails
[1821 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d8740 gate 1578074113148603400 evaluation fails
[1822 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1823 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1824 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1825 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 66 a8 63 31 cd ee 61 9e 3c bf c3 4c 0c 5a 74 |sf.c1..a.<..L.Zt|
00000010 35 86 4a c9 4e 40 a5 b3 92 05 9f e3 14 7d 98 22 |5.J.N@.......}."|
[1826 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 00 7f f6 92 34 11 02 19 1b 16 bd |0D. O....4......|
00000010 b6 ff 03 b5 b3 96 d8 0d 4e d1 be 69 9c e8 40 5b |........N..i..@[|
00000020 a7 2c 9b 4b 02 20 40 7f 47 36 be 3d 24 f5 22 06 |.,.K. @.G6.=$.".|
00000030 cb f4 69 e3 a4 b9 23 3e d3 63 6b 3f 18 3d 7d 3f |..i...#>.ck?.=}?|
00000040 84 cf 2c c2 17 43 |..,..C|
[1827 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1828 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d9040 gate 1578074113149188900 evaluation starts
[1829 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d9040 signed by 0 principal evaluation starts (used [false])
[182a 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d9040 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[182b 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d9040 principal evaluation succeeds for identity 0
[182c 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d9040 gate 1578074113149188900 evaluation succeeds
[182d 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[182e 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[182f 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1830 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1831 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1832 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}
[1833 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31
[1834 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31
[1835 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1836 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1837 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1838 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1813 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1839 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[183a 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[183b 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[183c 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[183d 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[183e 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[183f 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1840 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1841 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1842 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1843 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1844 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 d1 65 c2 5a 64 47 be 09 46 3f 4e 06 cc 25 39 |..e.ZdG..F?N..%9|
00000010 48 b5 9a 6e 53 0d 5d 26 dc 09 7e a8 76 fe 2c c4 |H..nS.]&..~.v.,.|
[1845 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 ad 04 e4 24 af 6a 0e 6c c1 d1 |0E.!.....$.j.l..|
00000010 44 ff f2 f8 a0 58 c1 d9 48 59 78 f2 4c 9b 7a e5 |D....X..HYx.L.z.|
00000020 9a bd f3 f4 0c 02 20 40 56 c5 16 fc 55 7d 54 26 |...... @V...U}T&|
00000030 6b 55 f8 ae d9 fe f8 dd 0e da 92 2b 22 5e f2 28 |kU.........+"^.(|
00000040 9d 72 c1 ea 19 f1 39 |.r....9|
[1846 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1812 01-03 17:55:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1847 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1848 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1849 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[184a 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[184b 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[184c 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[184d 01-03 17:55:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503650 gate 1578074113150751600 evaluation starts
[184e 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503650 signed by 0 principal evaluation starts (used [false])
[184f 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503650 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1850 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1851 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503650 principal evaluation fails
[1852 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503650 gate 1578074113150751600 evaluation fails
[1853 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1854 01-03 17:55:13.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1855 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1856 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 d1 65 c2 5a 64 47 be 09 46 3f 4e 06 cc 25 39 |..e.ZdG..F?N..%9|
00000010 48 b5 9a 6e 53 0d 5d 26 dc 09 7e a8 76 fe 2c c4 |H..nS.]&..~.v.,.|
[1857 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 ad 04 e4 24 af 6a 0e 6c c1 d1 |0E.!.....$.j.l..|
00000010 44 ff f2 f8 a0 58 c1 d9 48 59 78 f2 4c 9b 7a e5 |D....X..HYx.L.z.|
00000020 9a bd f3 f4 0c 02 20 40 56 c5 16 fc 55 7d 54 26 |...... @V...U}T&|
00000030 6b 55 f8 ae d9 fe f8 dd 0e da 92 2b 22 5e f2 28 |kU.........+"^.(|
00000040 9d 72 c1 ea 19 f1 39 |.r....9|
[1858 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1859 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035320c0 gate 1578074113172957300 evaluation starts
[185a 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035320c0 signed by 0 principal evaluation starts (used [false])
[185b 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035320c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[185c 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035320c0 principal evaluation succeeds for identity 0
[185d 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035320c0 gate 1578074113172957300 evaluation succeeds
[185e 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[185f 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1860 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1861 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1862 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes
[1863 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes]}
[1865 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29
[1864 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1866 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29
[1867 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1868 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1869 01-03 17:55:13.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[186a 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[186c 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[186b 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[186d 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[186e 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[186f 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1870 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1871 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1872 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1873 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1874 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1875 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1876 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1877 01-03 17:55:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1878 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[1879 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[187a 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[187b 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[187c 01-03 17:55:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[187d 01-03 17:55:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[187e 01-03 17:55:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[187f 01-03 17:55:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1880 01-03 17:55:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1882 01-03 17:55:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1881 01-03 17:55:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1883 01-03 17:55:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1884 01-03 17:55:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1886 01-03 17:55:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1885 01-03 17:55:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1887 01-03 17:55:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[1888 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9444085680654846760 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[1889 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[188a 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10525638246644934085 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[188b 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[188c 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12587865750855688180 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[188d 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10525638246644934085 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1890 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[188e 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9444085680654846760 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1891 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[188f 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12587865750855688180 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1892 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1893 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12587865750855688180 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[1894 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12587865750855688180 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[1895 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1896 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315101B
[1897 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C2C57B3F5B4D221DE9E539F5D23D9B4ECC2366BD196E3E75093537CC4DB9E721
[1898 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1899 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[189a 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[189b 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10525638246644934085 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[189c 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10525638246644934085 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[189d 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10525638246644934085 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[189e 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[189f 01-03 17:55:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9444085680654846760 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[18a0 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9444085680654846760 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[18a1 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9444085680654846760 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[18a2 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18a3 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18a4 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18a5 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18a6 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[18a7 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18a8 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[18a9 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[18aa 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[18ab 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18ac 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[18ad 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18ae 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[18af 01-03 17:55:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18b0 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315101C
[18b1 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5F3F13C80F319FA2CDDCE61B8B0C0EEF164D3EA6DBE2567789BB7FB4D748073F
[18b2 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[18b3 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[18b4 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18b5 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[18b6 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[18b7 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18b8 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[18b9 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[18bb 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[18bd 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18ba 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[18be 01-03 17:55:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18bc 01-03 17:55:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18bf 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[18c0 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18c1 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[18c2 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[18c3 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 3f 13 c8 0f 31 9f a2 cd dc e6 1b 8b 0c 0e ef |_?...1..........|
00000010 16 4d 3e a6 db e2 56 77 89 bb 7f b4 d7 48 07 3f |.M>...Vw.....H.?|
[18c4 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d da b3 3f 5e 9a 4b 1f 06 24 c5 8b |0D. M..?^.K..$..|
00000010 7a ec 3e 0b 8e f9 a7 24 92 29 69 08 c3 f4 d0 c2 |z.>....$.)i.....|
00000020 c5 60 e3 bf 02 20 1a 64 ec 4c 09 da d9 cd d4 3e |.`... .d.L.....>|
00000030 0b 34 ac 9b 46 1d 48 c3 82 36 ac 1c e4 3b 9f 1f |.4..F.H..6...;..|
00000040 8f c5 ba 52 88 3d |...R.=|
[18c5 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[18c6 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 ff 16 b0 ce f3 24 b5 7f 0f 07 eb |0D. 6.....$.....|
00000010 c3 4d 9c 5a f7 ee b6 7f 79 f9 3d 81 f1 8c db 18 |.M.Z....y.=.....|
00000020 c3 a9 2d 42 02 20 2f f4 c9 35 42 a1 ea 58 3c e7 |..-B. /..5B..X<.|
00000030 70 f3 52 04 f4 bc af b2 c4 5b d4 97 76 b8 df 93 |p.R......[..v...|
00000040 fc 3a 34 bc 11 d1 |.:4...|
[18c7 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[18c8 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[18c9 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18ca 01-03 17:55:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18cb 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[18cc 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[18cd 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18ce 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[18cf 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[18d0 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18d1 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[18d2 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[18d3 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[18d4 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[18d5 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[18d6 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[18d7 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 d1 65 c2 5a 64 47 be 09 46 3f 4e 06 cc 25 39 |..e.ZdG..F?N..%9|
00000010 48 b5 9a 6e 53 0d 5d 26 dc 09 7e a8 76 fe 2c c4 |H..nS.]&..~.v.,.|
[18d8 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 ad 04 e4 24 af 6a 0e 6c c1 d1 |0E.!.....$.j.l..|
00000010 44 ff f2 f8 a0 58 c1 d9 48 59 78 f2 4c 9b 7a e5 |D....X..HYx.L.z.|
00000020 9a bd f3 f4 0c 02 20 40 56 c5 16 fc 55 7d 54 26 |...... @V...U}T&|
00000030 6b 55 f8 ae d9 fe f8 dd 0e da 92 2b 22 5e f2 28 |kU.........+"^.(|
00000040 9d 72 c1 ea 19 f1 39 |.r....9|
[18d9 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[18da 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0e20 gate 1578074113346069400 evaluation starts
[18db 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0e20 signed by 0 principal evaluation starts (used [false])
[18dc 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0e20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[18dd 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[18de 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0e20 principal evaluation fails
[18df 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0e20 gate 1578074113346069400 evaluation fails
[18e0 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[18e1 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[18e2 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[18e3 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 d1 65 c2 5a 64 47 be 09 46 3f 4e 06 cc 25 39 |..e.ZdG..F?N..%9|
00000010 48 b5 9a 6e 53 0d 5d 26 dc 09 7e a8 76 fe 2c c4 |H..nS.]&..~.v.,.|
[18e4 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 ad 04 e4 24 af 6a 0e 6c c1 d1 |0E.!.....$.j.l..|
00000010 44 ff f2 f8 a0 58 c1 d9 48 59 78 f2 4c 9b 7a e5 |D....X..HYx.L.z.|
00000020 9a bd f3 f4 0c 02 20 40 56 c5 16 fc 55 7d 54 26 |...... @V...U}T&|
00000030 6b 55 f8 ae d9 fe f8 dd 0e da 92 2b 22 5e f2 28 |kU.........+"^.(|
00000040 9d 72 c1 ea 19 f1 39 |.r....9|
[18e5 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[18e6 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d1720 gate 1578074113347301300 evaluation starts
[18e7 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d1720 signed by 0 principal evaluation starts (used [false])
[18e8 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d1720 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[18e9 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d1720 principal evaluation succeeds for identity 0
[18ea 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d1720 gate 1578074113347301300 evaluation succeeds
[18eb 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[18ec 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[18ed 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[18ee 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[18ef 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes
[18f0 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18f1 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[18f2 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 3f 13 c8 0f 31 9f a2 cd dc e6 1b 8b 0c 0e ef |_?...1..........|
00000010 16 4d 3e a6 db e2 56 77 89 bb 7f b4 d7 48 07 3f |.M>...Vw.....H.?|
[18f3 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d da b3 3f 5e 9a 4b 1f 06 24 c5 8b |0D. M..?^.K..$..|
00000010 7a ec 3e 0b 8e f9 a7 24 92 29 69 08 c3 f4 d0 c2 |z.>....$.)i.....|
00000020 c5 60 e3 bf 02 20 1a 64 ec 4c 09 da d9 cd d4 3e |.`... .d.L.....>|
00000030 0b 34 ac 9b 46 1d 48 c3 82 36 ac 1c e4 3b 9f 1f |.4..F.H..6...;..|
00000040 8f c5 ba 52 88 3d |...R.=|
[18f4 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[18f5 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[18f6 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18f7 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[18f8 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 d5 05 1e 47 ed 80 93 61 f0 a7 bf 53 6b 12 cd |....G...a...Sk..|
00000010 39 2d 86 c8 21 a5 e1 a3 12 6f b0 30 6d 75 01 5f |9-..!....o.0mu._|
[18f9 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 61 fc 53 0e f6 bd 7c ed 66 91 |0E.!..a.S...|.f.|
00000010 9e c5 da 6e f3 1f b3 ac b6 a4 82 24 12 50 54 81 |...n.......$.PT.|
00000020 e5 8c 5a 18 10 02 20 15 68 1b d4 91 3e 39 bd 18 |..Z... .h...>9..|
00000030 14 91 77 6f ba d7 b9 bd f0 66 32 9d 2d 2b 30 75 |..wo.....f2.-+0u|
00000040 7e 02 bd 36 c8 01 8a |~..6...|
[18fa 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes
[18fb 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18fc 01-03 17:55:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18fd 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[18fe 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[18ff 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1900 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1901 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1902 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 d5 05 1e 47 ed 80 93 61 f0 a7 bf 53 6b 12 cd |....G...a...Sk..|
00000010 39 2d 86 c8 21 a5 e1 a3 12 6f b0 30 6d 75 01 5f |9-..!....o.0mu._|
[1903 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 61 fc 53 0e f6 bd 7c ed 66 91 |0E.!..a.S...|.f.|
00000010 9e c5 da 6e f3 1f b3 ac b6 a4 82 24 12 50 54 81 |...n.......$.PT.|
00000020 e5 8c 5a 18 10 02 20 15 68 1b d4 91 3e 39 bd 18 |..Z... .h...>9..|
00000030 14 91 77 6f ba d7 b9 bd f0 66 32 9d 2d 2b 30 75 |..wo.....f2.-+0u|
00000040 7e 02 bd 36 c8 01 8a |~..6...|
[1904 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes
[1905 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1906 01-03 17:55:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1907 01-03 17:55:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 3f 13 c8 0f 31 9f a2 cd dc e6 1b 8b 0c 0e ef |_?...1..........|
00000010 16 4d 3e a6 db e2 56 77 89 bb 7f b4 d7 48 07 3f |.M>...Vw.....H.?|
[1908 01-03 17:55:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d da b3 3f 5e 9a 4b 1f 06 24 c5 8b |0D. M..?^.K..$..|
00000010 7a ec 3e 0b 8e f9 a7 24 92 29 69 08 c3 f4 d0 c2 |z.>....$.)i.....|
00000020 c5 60 e3 bf 02 20 1a 64 ec 4c 09 da d9 cd d4 3e |.`... .d.L.....>|
00000030 0b 34 ac 9b 46 1d 48 c3 82 36 ac 1c e4 3b 9f 1f |.4..F.H..6...;..|
00000040 8f c5 ba 52 88 3d |...R.=|
[1909 01-03 17:55:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[190a 01-03 17:55:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[190b 01-03 17:55:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[190c 01-03 17:55:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[190d 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[190e 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[190f 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1910 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1913 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1911 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1914 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1912 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1915 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1916 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1917 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1918 01-03 17:55:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1919 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[191a 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[191b 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[191c 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[191d 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[191e 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[191f 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1920 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1921 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1922 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1923 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1925 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1927 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1928 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635ff0 gate 1578074113526840600 evaluation starts
[1929 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635ff0 signed by 0 principal evaluation starts (used [false])
[1926 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1924 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[192a 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635ff0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[192b 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[192c 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635ff0 principal evaluation fails
[192d 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635ff0 gate 1578074113526840600 evaluation fails
[192e 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[192f 01-03 17:55:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1930 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1931 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1932 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1933 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1934 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365c910 gate 1578074113534772600 evaluation starts
[1935 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365c910 signed by 0 principal evaluation starts (used [false])
[1936 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365c910 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1937 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365c910 principal evaluation succeeds for identity 0
[1938 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365c910 gate 1578074113534772600 evaluation succeeds
[1939 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[193a 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[193b 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[193c 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[193d 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[193e 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[193f 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1940 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1942 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1943 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1944 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1945 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1941 01-03 17:55:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1946 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1948 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1949 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[194a 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680370 gate 1578074113541962400 evaluation starts
[194b 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680370 signed by 0 principal evaluation starts (used [false])
[194c 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680370 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1947 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[194d 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[194e 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680370 principal evaluation fails
[194f 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680370 gate 1578074113541962400 evaluation fails
[1950 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1951 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1952 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1953 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1954 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1955 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1956 01-03 17:55:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003694360 gate 1578074113549015800 evaluation starts
[1957 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003694360 signed by 0 principal evaluation starts (used [false])
[1958 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003694360 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1959 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003694360 principal evaluation succeeds for identity 0
[195a 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003694360 gate 1578074113549015800 evaluation succeeds
[195b 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[195c 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[195d 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[195e 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[195f 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1960 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1961 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1962 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1963 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1964 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1965 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1966 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1967 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1968 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1969 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[196a 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[196b 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[196c 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[196d 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706070 gate 1578074113555745900 evaluation starts
[196e 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706070 signed by 0 principal evaluation starts (used [false])
[196f 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706070 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1970 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1971 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706070 principal evaluation fails
[1972 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706070 gate 1578074113555745900 evaluation fails
[1973 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1974 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1975 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1976 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1977 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1978 01-03 17:55:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1979 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706970 gate 1578074113566012900 evaluation starts
[197a 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706970 signed by 0 principal evaluation starts (used [false])
[197b 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706970 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[197c 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706970 principal evaluation succeeds for identity 0
[197d 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[197f 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1980 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1981 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8245368373004338211 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[197e 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706970 gate 1578074113566012900 evaluation succeeds
[1982 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1983 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1984 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1985 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1986 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8245368373004338211 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1987 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1989 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[198a 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[198b 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1988 01-03 17:55:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[198c 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[198d 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[198e 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[198f 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1990 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1991 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1992 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1993 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1994 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1995 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680ee0 gate 1578074113574648000 evaluation starts
[1996 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680ee0 signed by 0 principal evaluation starts (used [false])
[1997 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680ee0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1998 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1999 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680ee0 principal evaluation fails
[199a 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003680ee0 gate 1578074113574648000 evaluation fails
[199b 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[199c 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[199d 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[199e 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[199f 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[19a0 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[19a1 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036817e0 gate 1578074113577757400 evaluation starts
[19a2 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036817e0 signed by 0 principal evaluation starts (used [false])
[19a3 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036817e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[19a4 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036817e0 principal evaluation succeeds for identity 0
[19a5 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036817e0 gate 1578074113577757400 evaluation succeeds
[19a6 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[19a7 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[19a8 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[19a9 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[19aa 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[19ab 01-03 17:55:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[19ac 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19ad 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[19ae 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19af 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19b0 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19b1 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[19b2 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[19b3 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[19b4 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[19b5 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[19b6 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[19b7 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[19b8 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[19b9 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[19ba 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374dba0 gate 1578074113584093600 evaluation starts
[19bb 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374dba0 signed by 0 principal evaluation starts (used [false])
[19bc 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374dba0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[19bd 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374dba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[19be 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374dba0 principal evaluation fails
[19bf 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374dba0 gate 1578074113584093600 evaluation fails
[19c0 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[19c1 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[19c2 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[19c3 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[19c4 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[19c5 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[19c6 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037864a0 gate 1578074113587298000 evaluation starts
[19c7 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037864a0 signed by 0 principal evaluation starts (used [false])
[19c8 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037864a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[19c9 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037864a0 principal evaluation succeeds for identity 0
[19ca 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037864a0 gate 1578074113587298000 evaluation succeeds
[19cb 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[19cc 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[19cd 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[19ce 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[19cf 01-03 17:55:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[19d0 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[19d1 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[19d2 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[19d3 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19d4 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19d5 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[19d6 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[19d7 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[19d8 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[19d9 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[19da 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[19db 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[19dc 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[19dd 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[19de 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e0c60 gate 1578074113594066300 evaluation starts
[19df 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e0c60 signed by 0 principal evaluation starts (used [false])
[19e0 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e0c60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[19e1 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e0c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[19e2 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e0c60 principal evaluation fails
[19e3 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e0c60 gate 1578074113594066300 evaluation fails
[19e4 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[19e5 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[19e6 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[19e7 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[19e8 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[19e9 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[19ea 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e1560 gate 1578074113594471500 evaluation starts
[19eb 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e1560 signed by 0 principal evaluation starts (used [false])
[19ec 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e1560 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[19ed 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e1560 principal evaluation succeeds for identity 0
[19ee 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e1560 gate 1578074113594471500 evaluation succeeds
[19ef 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[19f0 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[19f1 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[19f2 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[19f3 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19f4 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8245368373004338211 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[19f5 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8245368373004338211 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[19f6 01-03 17:55:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19f7 01-03 17:55:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[19f8 01-03 17:55:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19f9 01-03 17:55:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19fa 01-03 17:55:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19fb 01-03 17:55:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7293674241430171228 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[19fc 01-03 17:55:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7293674241430171228 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[19fd 01-03 17:55:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[19fe 01-03 17:55:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19ff 01-03 17:55:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1a00 01-03 17:55:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1a01 01-03 17:55:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a02 01-03 17:55:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a03 01-03 17:55:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a04 01-03 17:55:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a05 01-03 17:55:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1a06 01-03 17:55:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1a07 01-03 17:55:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a08 01-03 17:55:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a09 01-03 17:55:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a0a 01-03 17:55:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a0b 01-03 17:55:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:8598511409874230820 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1a0c 01-03 17:55:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8598511409874230820 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1a0d 01-03 17:55:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1a0e 01-03 17:55:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a0f 01-03 17:55:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1a10 01-03 17:55:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a11 01-03 17:55:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1a12 01-03 17:55:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1a13 01-03 17:55:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 27 82 70 74 59 c4 be c8 89 99 2d ca 14 dc 1e |.'.ptY.....-....|
00000010 78 4a 54 3d 7a 14 50 9c 22 14 20 27 b3 8e cf c4 |xJT=z.P.". '....|
[1a14 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 e7 83 79 3f df fa 4d f9 40 f1 |0E.!....y?..M.@.|
00000010 ea cc 7a 90 5d b3 af a2 40 9f c1 7a 96 ce 83 51 |..z.]...@..z...Q|
00000020 f9 10 d9 d1 90 02 20 16 3a a8 38 74 9d fc 64 5e |...... .:.8t..d^|
00000030 23 9a cc e6 e5 54 77 84 3f aa 2f ef 44 32 c6 9e |#....Tw.?./.D2..|
00000040 c3 43 cd 60 aa 3c 4d |.C.`.<M|
[1a15 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1a16 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 39 e0 df 56 a0 54 c9 09 0e 74 |0E.!..9..V.T...t|
00000010 b4 fc d8 fd 76 d5 f8 02 c5 3c 1a 25 89 5a 35 14 |....v....<.%.Z5.|
00000020 71 57 78 b4 76 02 20 34 9a c6 78 c2 0f e0 ec f0 |qWx.v. 4..x.....|
00000030 b8 ce f9 93 16 19 5e fd 58 83 dc 27 9b 3e 5d d5 |......^.X..'.>].|
00000040 bf 04 c5 80 2b ec b9 |....+..|
[1a17 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1a18 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[1a19 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:32
[1a1a 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:32
[1a1b 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[1a1c 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a1d 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a1e 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a1f 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1a20 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a21 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a22 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[1a23 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1a24 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[1a25 01-03 17:55:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a26 01-03 17:55:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[1a27 01-03 17:55:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[1a28 01-03 17:55:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510071801
[1a29 01-03 17:55:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AC5F08586A8108859EBAB630AF8CF6D89C5FAFB029FCCD6CC046D7DFDC7CD4CD
[1a2a 01-03 17:55:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[1a2b 01-03 17:55:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a2c 01-03 17:55:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a2d 01-03 17:55:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a2e 01-03 17:55:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a2f 01-03 17:55:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1a30 01-03 17:55:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a31 01-03 17:55:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a32 01-03 17:55:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[1a33 01-03 17:55:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a34 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1a35 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a36 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1a37 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1a38 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 c1 95 cf 54 ba 66 42 11 19 1e f5 ad 3f 50 ef |P...T.fB.....?P.|
00000010 d4 f4 fd 0b 91 b4 ec d6 74 10 a2 2a 25 be 00 f7 |........t..*%...|
[1a39 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e ef d6 e1 dd 80 24 be aa 6a ba 37 |0D. ~.....$..j.7|
00000010 4d 41 ca ad 1a d4 e4 bd e3 e7 f5 5a 75 cf 26 33 |MA.........Zu.&3|
00000020 a1 47 36 75 02 20 5a a7 98 cd 1e c9 00 48 5f 4f |.G6u. Z......H_O|
00000030 5f ea 0d 81 27 05 ad b1 ae 5c 84 d7 f3 a4 26 31 |_...'....\....&1|
00000040 99 38 5f 7a 70 7b |.8_zp{|
[1a3a 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1a3b 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 30 c3 cd a6 fc 82 70 a9 18 50 65 |0D. E0.....p..Pe|
00000010 99 36 ce 69 d8 b1 a3 70 f6 44 6c a8 c2 ae 2f 02 |.6.i...p.Dl.../.|
00000020 38 36 b5 0a 02 20 15 54 db de 3f ff e1 6d f5 21 |86... .T..?..m.!|
00000030 2a c7 b1 29 f6 5c ac 97 ae 05 af ac 6c ce 5f fd |*..).\......l._.|
00000040 d3 67 35 1e 89 4f |.g5..O|
[1a3c 01-03 17:55:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1a3d 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[1a3e 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33
[1a3f 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33
[1a40 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[1a41 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a42 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a43 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a44 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a45 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a46 01-03 17:55:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a47 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1a48 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a49 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1a4a 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1a4b 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a4c 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1a4d 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a4e 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1a4f 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1a50 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a51 01-03 17:55:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1a52 01-03 17:55:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a53 01-03 17:55:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1a54 01-03 17:55:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1a55 01-03 17:55:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a56 01-03 17:55:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1a57 01-03 17:55:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a58 01-03 17:55:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5796635974783459184 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1a59 01-03 17:55:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:5796635974783459184 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1a5a 01-03 17:55:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5796635974783459184 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1a5b 01-03 17:55:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a5c 01-03 17:55:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a5d 01-03 17:55:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a5e 01-03 17:55:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a5f 01-03 17:55:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a60 01-03 17:55:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a61 01-03 17:55:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[1a62 01-03 17:55:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a63 01-03 17:55:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:10104152246180497388 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1a64 01-03 17:55:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:10104152246180497388 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1a65 01-03 17:55:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10104152246180497388 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1a66 01-03 17:55:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a67 01-03 17:55:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a68 01-03 17:55:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a69 01-03 17:55:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a6a 01-03 17:55:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a6b 01-03 17:55:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a6c 01-03 17:55:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1a6d 01-03 17:55:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a6e 01-03 17:55:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1a6f 01-03 17:55:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1a70 01-03 17:55:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a71 01-03 17:55:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1a72 01-03 17:55:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[1a73 01-03 17:55:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a74 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1a75 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1a76 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1a77 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1a78 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1a79 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1a7a 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe 61 8a 72 e1 50 0b e6 28 72 a8 36 40 c0 31 3d |.a.r.P..(r.6@.1=|
00000010 2b 0d c0 f9 00 43 3b 1c 74 b9 01 25 ff 05 2a 02 |+....C;.t..%..*.|
[1a7b 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 9a a1 80 c1 3c f2 e2 92 ea a2 0d |0D. &....<......|
00000010 be 39 01 e0 29 21 47 c8 ba cc 54 a6 84 ac 54 c8 |.9..)!G...T...T.|
00000020 70 33 c4 9f 02 20 5f c7 2f 10 3c 0f e7 85 f4 c6 |p3... _./.<.....|
00000030 df b6 89 49 a3 48 e5 0a e6 f0 80 3b a2 48 e4 79 |...I.H.....;.H.y|
00000040 d1 87 75 41 bc a2 |..uA..|
[1a7c 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1a7d 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d8ef0 gate 1578074117102854300 evaluation starts
[1a7e 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d8ef0 signed by 0 principal evaluation starts (used [false])
[1a7f 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d8ef0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1a80 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d8ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1a81 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d8ef0 principal evaluation fails
[1a82 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d8ef0 gate 1578074117102854300 evaluation fails
[1a83 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1a84 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1a85 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1a86 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe 61 8a 72 e1 50 0b e6 28 72 a8 36 40 c0 31 3d |.a.r.P..(r.6@.1=|
00000010 2b 0d c0 f9 00 43 3b 1c 74 b9 01 25 ff 05 2a 02 |+....C;.t..%..*.|
[1a87 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 9a a1 80 c1 3c f2 e2 92 ea a2 0d |0D. &....<......|
00000010 be 39 01 e0 29 21 47 c8 ba cc 54 a6 84 ac 54 c8 |.9..)!G...T...T.|
00000020 70 33 c4 9f 02 20 5f c7 2f 10 3c 0f e7 85 f4 c6 |p3... _./.<.....|
00000030 df b6 89 49 a3 48 e5 0a e6 f0 80 3b a2 48 e4 79 |...I.H.....;.H.y|
00000040 d1 87 75 41 bc a2 |..uA..|
[1a88 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1a89 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d97f0 gate 1578074117106232400 evaluation starts
[1a8a 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d97f0 signed by 0 principal evaluation starts (used [false])
[1a8b 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d97f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1a8c 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d97f0 principal evaluation succeeds for identity 0
[1a8d 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d97f0 gate 1578074117106232400 evaluation succeeds
[1a8e 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1a8f 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1a90 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1a91 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1a92 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes
[1a93 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes]}
[1a94 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32
[1a95 01-03 17:55:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32
[1a96 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1a97 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a98 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a99 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1a9a 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a9b 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a9c 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a9d 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[1a9e 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1a9f 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1aa0 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1aa1 01-03 17:55:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1aa2 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1aa3 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1aa4 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1aa5 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1aa6 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1aa7 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1aa8 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1aa9 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1aaa 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1aab 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1aac 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1aad 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1aae 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 24 de 53 5c 62 aa 1d 3e 9f 81 cf a9 f1 05 de |:$.S\b..>.......|
00000010 b2 d5 5c 5d a6 ab de c1 b9 96 66 57 99 db 91 b9 |..\]......fW....|
[1aaf 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 78 f5 a0 ba 16 7d e0 72 f4 06 e1 |0D. ex....}.r...|
00000010 06 2c 0a c4 96 e6 18 da aa f9 14 0d 32 d5 3b a1 |.,..........2.;.|
00000020 b5 68 85 8a 02 20 3e 33 f7 21 3a 6c 53 70 e4 47 |.h... >3.!:lSp.G|
00000030 4d 31 ed 10 c5 20 cb 27 a5 5f ba 8f 03 de 95 35 |M1... .'._.....5|
00000040 a2 aa 02 17 cb 3a |.....:|
[1ab0 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ab1 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e9ff0 gate 1578074117127450800 evaluation starts
[1ab2 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e9ff0 signed by 0 principal evaluation starts (used [false])
[1ab3 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e9ff0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1ab4 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e9ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1ab5 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e9ff0 principal evaluation fails
[1ab6 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e9ff0 gate 1578074117127450800 evaluation fails
[1ab7 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ab8 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ab9 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1aba 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 24 de 53 5c 62 aa 1d 3e 9f 81 cf a9 f1 05 de |:$.S\b..>.......|
00000010 b2 d5 5c 5d a6 ab de c1 b9 96 66 57 99 db 91 b9 |..\]......fW....|
[1abb 01-03 17:55:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 78 f5 a0 ba 16 7d e0 72 f4 06 e1 |0D. ex....}.r...|
00000010 06 2c 0a c4 96 e6 18 da aa f9 14 0d 32 d5 3b a1 |.,..........2.;.|
00000020 b5 68 85 8a 02 20 3e 33 f7 21 3a 6c 53 70 e4 47 |.h... >3.!:lSp.G|
00000030 4d 31 ed 10 c5 20 cb 27 a5 5f ba 8f 03 de 95 35 |M1... .'._.....5|
00000040 a2 aa 02 17 cb 3a |.....:|
[1abc 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1abd 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148f0 gate 1578074117130919300 evaluation starts
[1abe 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148f0 signed by 0 principal evaluation starts (used [false])
[1abf 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1ac0 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148f0 principal evaluation succeeds for identity 0
[1ac1 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148f0 gate 1578074117130919300 evaluation succeeds
[1ac2 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1ac3 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1ac4 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1ac5 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1ac6 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1ac7 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}
[1ac8 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30
[1ac9 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30
[1aca 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1acb 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1acc 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1acd 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ace 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[1acf 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ad0 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ad1 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ad2 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[1ad3 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1ad4 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1ad5 01-03 17:55:17.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ad6 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[1ad7 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17468500211577512381 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[1ad8 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[1ad9 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:926137456911184204 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1ada 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17468500211577512381 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1adc 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:926137456911184204 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1ade 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1adb 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[1adf 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:370993041853953613 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1ae0 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:370993041853953613 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1add 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ae1 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ae2 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 370993041853953613 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[1ae3 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 370993041853953613 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[1ae4 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 370993041853953613 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[1ae5 01-03 17:55:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ae6 01-03 17:55:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17468500211577512381 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[1ae7 01-03 17:55:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17468500211577512381 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[1ae8 01-03 17:55:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17468500211577512381 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[1ae9 01-03 17:55:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1aea 01-03 17:55:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 926137456911184204 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[1aeb 01-03 17:55:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 926137456911184204 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[1aec 01-03 17:55:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1aed 01-03 17:55:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315101D
[1aee 01-03 17:55:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A271EFD8847C57DD7375F40EBEC2E1550A2F6382B1CF810EFF7C71740A931FA9
[1aef 01-03 17:55:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1af0 01-03 17:55:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1af1 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1af2 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[1af3 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[1af4 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1af5 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[1af6 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1af7 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1af8 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1af9 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1afa 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[1afb 01-03 17:55:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1afc 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[1afd 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[1afe 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1aff 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[1b00 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1b01 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b02 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1b03 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1b04 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1b05 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1b06 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1b07 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1b08 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 24 de 53 5c 62 aa 1d 3e 9f 81 cf a9 f1 05 de |:$.S\b..>.......|
00000010 b2 d5 5c 5d a6 ab de c1 b9 96 66 57 99 db 91 b9 |..\]......fW....|
[1b09 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 78 f5 a0 ba 16 7d e0 72 f4 06 e1 |0D. ex....}.r...|
00000010 06 2c 0a c4 96 e6 18 da aa f9 14 0d 32 d5 3b a1 |.,..........2.;.|
00000020 b5 68 85 8a 02 20 3e 33 f7 21 3a 6c 53 70 e4 47 |.h... >3.!:lSp.G|
00000030 4d 31 ed 10 c5 20 cb 27 a5 5f ba 8f 03 de 95 35 |M1... .'._.....5|
00000040 a2 aa 02 17 cb 3a |.....:|
[1b0a 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b0b 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003933c00 gate 1578074117326154700 evaluation starts
[1b0c 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003933c00 signed by 0 principal evaluation starts (used [false])
[1b0d 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003933c00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1b0e 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003933c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1b0f 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003933c00 principal evaluation fails
[1b10 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003933c00 gate 1578074117326154700 evaluation fails
[1b11 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1b12 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1b13 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1b14 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 24 de 53 5c 62 aa 1d 3e 9f 81 cf a9 f1 05 de |:$.S\b..>.......|
00000010 b2 d5 5c 5d a6 ab de c1 b9 96 66 57 99 db 91 b9 |..\]......fW....|
[1b15 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 78 f5 a0 ba 16 7d e0 72 f4 06 e1 |0D. ex....}.r...|
00000010 06 2c 0a c4 96 e6 18 da aa f9 14 0d 32 d5 3b a1 |.,..........2.;.|
00000020 b5 68 85 8a 02 20 3e 33 f7 21 3a 6c 53 70 e4 47 |.h... >3.!:lSp.G|
00000030 4d 31 ed 10 c5 20 cb 27 a5 5f ba 8f 03 de 95 35 |M1... .'._.....5|
00000040 a2 aa 02 17 cb 3a |.....:|
[1b16 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b17 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003980500 gate 1578074117328909400 evaluation starts
[1b18 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003980500 signed by 0 principal evaluation starts (used [false])
[1b19 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003980500 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1b1a 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003980500 principal evaluation succeeds for identity 0
[1b1b 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003980500 gate 1578074117328909400 evaluation succeeds
[1b1c 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1b1d 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1b1e 01-03 17:55:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1b1f 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1b20 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1b21 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b22 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1b23 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 71 ef d8 84 7c 57 dd 73 75 f4 0e be c2 e1 55 |.q...|W.su.....U|
00000010 0a 2f 63 82 b1 cf 81 0e ff 7c 71 74 0a 93 1f a9 |./c......|qt....|
[1b24 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 36 0a 04 35 2a c1 3a 48 5b 34 9f |0D. ;6..5*.:H[4.|
00000010 4f c4 fb ad 74 83 da 40 e7 7f 0a 2c a4 9d 58 ef |O...t..@...,..X.|
00000020 20 dd ea ef 02 20 3c f5 98 bf db 70 d6 fb 68 28 | .... <....p..h(|
00000030 51 d1 f5 f8 fc 6a 60 ef 73 03 b0 49 97 9e 74 0b |Q....j`.s..I..t.|
00000040 51 5f 02 b9 23 23 |Q_..##|
[1b25 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1b26 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1b27 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b28 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b29 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[1b2a 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b2b 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[1b2c 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1b2d 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 71 ef d8 84 7c 57 dd 73 75 f4 0e be c2 e1 55 |.q...|W.su.....U|
00000010 0a 2f 63 82 b1 cf 81 0e ff 7c 71 74 0a 93 1f a9 |./c......|qt....|
[1b2e 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 36 0a 04 35 2a c1 3a 48 5b 34 9f |0D. ;6..5*.:H[4.|
00000010 4f c4 fb ad 74 83 da 40 e7 7f 0a 2c a4 9d 58 ef |O...t..@...,..X.|
00000020 20 dd ea ef 02 20 3c f5 98 bf db 70 d6 fb 68 28 | .... <....p..h(|
00000030 51 d1 f5 f8 fc 6a 60 ef 73 03 b0 49 97 9e 74 0b |Q....j`.s..I..t.|
00000040 51 5f 02 b9 23 23 |Q_..##|
[1b2f 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1b30 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b f5 b1 8e 28 48 c6 d3 bb b1 b2 |0E.!.....(H.....|
00000010 30 2f 31 b4 c7 6d 56 e6 cd 09 fb 63 c6 3b 44 37 |0/1..mV....c.;D7|
00000020 d8 50 44 7e 31 02 20 23 dc e4 8a be d8 6e 93 f6 |.PD~1. #.....n..|
00000030 1b ed bd 1a 11 ca b7 01 df 87 be cc f7 6e 41 23 |.............nA#|
00000040 20 87 14 78 9d cc ab | ..x...|
[1b31 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1b32 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1b33 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b34 01-03 17:55:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b35 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[1b36 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[1b37 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b38 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[1b39 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[1b3a 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b3b 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1b3c 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1b3d 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1b3e 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1b3f 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1b40 01-03 17:55:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1b41 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe 61 8a 72 e1 50 0b e6 28 72 a8 36 40 c0 31 3d |.a.r.P..(r.6@.1=|
00000010 2b 0d c0 f9 00 43 3b 1c 74 b9 01 25 ff 05 2a 02 |+....C;.t..%..*.|
[1b42 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 9a a1 80 c1 3c f2 e2 92 ea a2 0d |0D. &....<......|
00000010 be 39 01 e0 29 21 47 c8 ba cc 54 a6 84 ac 54 c8 |.9..)!G...T...T.|
00000020 70 33 c4 9f 02 20 5f c7 2f 10 3c 0f e7 85 f4 c6 |p3... _./.<.....|
00000030 df b6 89 49 a3 48 e5 0a e6 f0 80 3b a2 48 e4 79 |...I.H.....;.H.y|
00000040 d1 87 75 41 bc a2 |..uA..|
[1b43 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b44 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039755b0 gate 1578074117353863500 evaluation starts
[1b45 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039755b0 signed by 0 principal evaluation starts (used [false])
[1b46 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039755b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1b47 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039755b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1b48 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039755b0 principal evaluation fails
[1b49 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039755b0 gate 1578074117353863500 evaluation fails
[1b4a 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1b4b 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1b4c 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1b4d 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe 61 8a 72 e1 50 0b e6 28 72 a8 36 40 c0 31 3d |.a.r.P..(r.6@.1=|
00000010 2b 0d c0 f9 00 43 3b 1c 74 b9 01 25 ff 05 2a 02 |+....C;.t..%..*.|
[1b4e 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 9a a1 80 c1 3c f2 e2 92 ea a2 0d |0D. &....<......|
00000010 be 39 01 e0 29 21 47 c8 ba cc 54 a6 84 ac 54 c8 |.9..)!G...T...T.|
00000020 70 33 c4 9f 02 20 5f c7 2f 10 3c 0f e7 85 f4 c6 |p3... _./.<.....|
00000030 df b6 89 49 a3 48 e5 0a e6 f0 80 3b a2 48 e4 79 |...I.H.....;.H.y|
00000040 d1 87 75 41 bc a2 |..uA..|
[1b4f 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b50 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975eb0 gate 1578074117355967100 evaluation starts
[1b51 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975eb0 signed by 0 principal evaluation starts (used [false])
[1b52 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975eb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1b53 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975eb0 principal evaluation succeeds for identity 0
[1b54 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975eb0 gate 1578074117355967100 evaluation succeeds
[1b55 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1b56 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1b57 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1b58 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1b59 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes
[1b5a 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b5b 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1b5c 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 71 ef d8 84 7c 57 dd 73 75 f4 0e be c2 e1 55 |.q...|W.su.....U|
00000010 0a 2f 63 82 b1 cf 81 0e ff 7c 71 74 0a 93 1f a9 |./c......|qt....|
[1b5d 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 36 0a 04 35 2a c1 3a 48 5b 34 9f |0D. ;6..5*.:H[4.|
00000010 4f c4 fb ad 74 83 da 40 e7 7f 0a 2c a4 9d 58 ef |O...t..@...,..X.|
00000020 20 dd ea ef 02 20 3c f5 98 bf db 70 d6 fb 68 28 | .... <....p..h(|
00000030 51 d1 f5 f8 fc 6a 60 ef 73 03 b0 49 97 9e 74 0b |Q....j`.s..I..t.|
00000040 51 5f 02 b9 23 23 |Q_..##|
[1b5e 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1b5f 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1b60 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b61 01-03 17:55:17.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b62 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b63 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b64 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1b65 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1b66 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b67 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1b68 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b69 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1b6a 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b6b 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1b6c 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1b6d 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1b6e 01-03 17:55:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1b6f 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1b70 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1b71 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1b72 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b73 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b74 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1b75 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1b76 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1b77 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1b78 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1b79 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1b7a 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1b7b 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1b7c 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b7d 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f5940 gate 1578074117522827500 evaluation starts
[1b7e 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f5940 signed by 0 principal evaluation starts (used [false])
[1b7f 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f5940 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1b80 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f5940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1b81 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f5940 principal evaluation fails
[1b82 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f5940 gate 1578074117522827500 evaluation fails
[1b83 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1b84 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1b85 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1b86 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1b87 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1b88 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b89 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a240 gate 1578074117524779200 evaluation starts
[1b8a 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a240 signed by 0 principal evaluation starts (used [false])
[1b8b 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a240 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1b8c 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a240 principal evaluation succeeds for identity 0
[1b8d 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a240 gate 1578074117524779200 evaluation succeeds
[1b8e 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1b8f 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1b90 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1b91 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1b92 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b93 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b94 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1b95 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1b96 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1b97 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1b98 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1b99 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1b9a 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1b9b 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1b9c 01-03 17:55:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b9d 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2bca0 gate 1578074117529999100 evaluation starts
[1b9e 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2bca0 signed by 0 principal evaluation starts (used [false])
[1b9f 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2bca0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1ba0 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2bca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1ba1 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2bca0 principal evaluation fails
[1ba2 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2bca0 gate 1578074117529999100 evaluation fails
[1ba3 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ba4 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ba5 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1ba6 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1ba7 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1ba8 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ba9 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4c5a0 gate 1578074117531652000 evaluation starts
[1baa 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4c5a0 signed by 0 principal evaluation starts (used [false])
[1bab 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4c5a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1bac 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4c5a0 principal evaluation succeeds for identity 0
[1bad 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4c5a0 gate 1578074117531652000 evaluation succeeds
[1bae 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1baf 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1bb0 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1bb1 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1bb2 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bb3 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1bb4 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bb5 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bb6 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bb7 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1bb8 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1bb9 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1bba 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1bbb 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1bbc 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1bbd 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1bbe 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1bbf 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1bc0 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7a2b0 gate 1578074117536323100 evaluation starts
[1bc1 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7a2b0 signed by 0 principal evaluation starts (used [false])
[1bc2 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7a2b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1bc3 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7a2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1bc4 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7a2b0 principal evaluation fails
[1bc5 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7a2b0 gate 1578074117536323100 evaluation fails
[1bc6 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1bc7 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1bc8 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1bc9 01-03 17:55:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1bca 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1bcb 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1bcc 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7abb0 gate 1578074117540694400 evaluation starts
[1bcd 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7abb0 signed by 0 principal evaluation starts (used [false])
[1bce 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7abb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1bcf 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7abb0 principal evaluation succeeds for identity 0
[1bd0 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7abb0 gate 1578074117540694400 evaluation succeeds
[1bd1 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1bd2 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1bd3 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1bd4 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1bd5 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1bd6 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1bd7 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bd8 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bd9 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1bda 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1bdb 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1bdc 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1bdd 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1bde 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1bdf 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1be0 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1be1 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1be2 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaacc0 gate 1578074117544223100 evaluation starts
[1be3 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaacc0 signed by 0 principal evaluation starts (used [false])
[1be4 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaacc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1be5 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaacc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1be6 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaacc0 principal evaluation fails
[1be7 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaacc0 gate 1578074117544223100 evaluation fails
[1be8 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1be9 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1bea 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1beb 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1bec 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1bed 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1bee 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab5c0 gate 1578074117544983800 evaluation starts
[1bef 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab5c0 signed by 0 principal evaluation starts (used [false])
[1bf0 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab5c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1bf1 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab5c0 principal evaluation succeeds for identity 0
[1bf2 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aab5c0 gate 1578074117544983800 evaluation succeeds
[1bf3 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1bf4 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1bf5 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1bf6 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1bf7 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1bf8 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1bf9 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bfa 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1bfb 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bfc 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bfd 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bfe 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1bff 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1c00 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1c01 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1c02 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1c03 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1c04 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1c05 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1c06 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c07 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add980 gate 1578074117547330000 evaluation starts
[1c08 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add980 signed by 0 principal evaluation starts (used [false])
[1c09 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add980 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1c0a 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1c0b 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add980 principal evaluation fails
[1c0c 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003add980 gate 1578074117547330000 evaluation fails
[1c0d 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1c0e 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1c0f 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1c10 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1c11 01-03 17:55:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1c12 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c13 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfe280 gate 1578074117550527600 evaluation starts
[1c14 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfe280 signed by 0 principal evaluation starts (used [false])
[1c15 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfe280 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1c16 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfe280 principal evaluation succeeds for identity 0
[1c17 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfe280 gate 1578074117550527600 evaluation succeeds
[1c18 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1c19 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1c1a 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1c1b 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1c1c 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1c1d 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1c1e 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1c1f 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1c20 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c21 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c22 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1c23 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1c24 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1c25 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1c26 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1c27 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1c28 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1c29 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1c2a 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c2b 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d8a40 gate 1578074117556129600 evaluation starts
[1c2c 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d8a40 signed by 0 principal evaluation starts (used [false])
[1c2d 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d8a40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1c2e 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d8a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1c2f 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d8a40 principal evaluation fails
[1c30 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d8a40 gate 1578074117556129600 evaluation fails
[1c31 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1c32 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1c33 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1c34 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1c35 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1c36 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c37 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d9340 gate 1578074117557423000 evaluation starts
[1c38 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d9340 signed by 0 principal evaluation starts (used [false])
[1c39 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d9340 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1c3a 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d9340 principal evaluation succeeds for identity 0
[1c3b 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059d9340 gate 1578074117557423000 evaluation succeeds
[1c3c 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1c3d 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1c3e 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1c3f 01-03 17:55:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1c40 01-03 17:55:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c41 01-03 17:55:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c42 01-03 17:55:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c43 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1c44 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c45 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c46 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10780711441252902109 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[1c47 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10780711441252902109 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1c48 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c49 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10780711441252902109 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[1c4a 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10780711441252902109 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[1c4b 01-03 17:55:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c4c 01-03 17:55:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[1c4d 01-03 17:55:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c4e 01-03 17:55:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c4f 01-03 17:55:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c50 01-03 17:55:17.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5200832279343577381 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1c51 01-03 17:55:17.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5200832279343577381 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1c52 01-03 17:55:17.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1c53 01-03 17:55:17.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c54 01-03 17:55:18.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c55 01-03 17:55:18.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c56 01-03 17:55:18.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c57 01-03 17:55:18.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c58 01-03 17:55:18.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1c59 01-03 17:55:18.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c5a 01-03 17:55:18.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1c5b 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1c5c 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1c5d 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1c5e 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1c5f 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1c60 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 33 41 88 93 5e d8 ab fa a9 3d 6d 53 8a 41 72 |.3A..^....=mS.Ar|
00000010 03 04 e5 5a ea c9 b1 4c a9 a7 0f b6 0d 68 85 07 |...Z...L.....h..|
[1c61 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 47 d3 7c e6 cf 51 35 4a 91 67 77 |0D. eG.|..Q5J.gw|
00000010 6e 25 fe 3a 3a 9d 19 b0 13 73 23 34 bf f1 85 53 |n%.::....s#4...S|
00000020 8e b1 00 1e 02 20 2c ca 56 af 3f 8c 5b 97 af 9b |..... ,.V.?.[...|
00000030 da dc 76 26 04 47 e3 95 35 27 45 71 99 cd 6b 16 |..v&.G..5'Eq..k.|
00000040 ad 69 c9 81 9b c8 |.i....|
[1c62 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c63 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1bc0 gate 1578074118066892100 evaluation starts
[1c64 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1bc0 signed by 0 principal evaluation starts (used [false])
[1c65 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1bc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1c66 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1c67 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1bc0 principal evaluation fails
[1c68 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1bc0 gate 1578074118066892100 evaluation fails
[1c69 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1c6a 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1c6b 01-03 17:55:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1c6c 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 33 41 88 93 5e d8 ab fa a9 3d 6d 53 8a 41 72 |.3A..^....=mS.Ar|
00000010 03 04 e5 5a ea c9 b1 4c a9 a7 0f b6 0d 68 85 07 |...Z...L.....h..|
[1c6d 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 47 d3 7c e6 cf 51 35 4a 91 67 77 |0D. eG.|..Q5J.gw|
00000010 6e 25 fe 3a 3a 9d 19 b0 13 73 23 34 bf f1 85 53 |n%.::....s#4...S|
00000020 8e b1 00 1e 02 20 2c ca 56 af 3f 8c 5b 97 af 9b |..... ,.V.?.[...|
00000030 da dc 76 26 04 47 e3 95 35 27 45 71 99 cd 6b 16 |..v&.G..5'Eq..k.|
00000040 ad 69 c9 81 9b c8 |.i....|
[1c6e 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c6f 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a164c0 gate 1578074118075459600 evaluation starts
[1c70 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a164c0 signed by 0 principal evaluation starts (used [false])
[1c71 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a164c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1c72 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a164c0 principal evaluation succeeds for identity 0
[1c73 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a164c0 gate 1578074118075459600 evaluation succeeds
[1c74 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1c75 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1c76 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1c77 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1c78 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c79 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}
[1c7a 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31
[1c7b 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31
[1c7c 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1c7d 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c7e 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c7f 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c80 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c81 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c82 01-03 17:55:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c83 01-03 17:55:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c84 01-03 17:55:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c85 01-03 17:55:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c86 01-03 17:55:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c87 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c88 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c89 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c8a 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c8b 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c8c 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1c8d 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c8e 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c8f 01-03 17:55:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c90 01-03 17:55:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1c91 01-03 17:55:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c92 01-03 17:55:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c93 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c94 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c95 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1c96 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c97 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1c98 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1c99 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c9a 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1c9b 01-03 17:55:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[1c9c 01-03 17:55:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c9d 01-03 17:55:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1c9e 01-03 17:55:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1c9f 01-03 17:55:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1ca0 01-03 17:55:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1ca1 01-03 17:55:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1ca2 01-03 17:55:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1ca3 01-03 17:55:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 af bf 6a ae d0 d1 3c 12 48 3c 9e 0c eb 6b 97 |t..j...<.H<...k.|
00000010 a2 57 52 04 ba 5d f6 52 1e 2d 76 e2 d7 82 14 57 |.WR..].R.-v....W|
[1ca4 01-03 17:55:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 60 a3 87 20 4e 27 11 c6 e4 1b c3 |0D. z`.. N'.....|
00000010 c6 ab 89 c3 61 79 de 26 0f b9 8e 1b 13 7e f6 7d |....ay.&.....~.}|
00000020 af 13 b2 32 02 20 1a d7 50 42 1e 18 a5 80 f7 42 |...2. ..PB.....B|
00000030 49 b6 7d 21 6a ed 1d 73 fc d9 0e 8b 91 ae b3 d7 |I.}!j..s........|
00000040 5a 9c ec a2 53 2f |Z...S/|
[1ca5 01-03 17:55:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ca6 01-03 17:55:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d700 gate 1578074118175423900 evaluation starts
[1ca7 01-03 17:55:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d700 signed by 0 principal evaluation starts (used [false])
[1ca8 01-03 17:55:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d700 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1ca9 01-03 17:55:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1caa 01-03 17:55:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d700 principal evaluation fails
[1cab 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d700 gate 1578074118175423900 evaluation fails
[1cac 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1cad 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1cae 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1caf 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 af bf 6a ae d0 d1 3c 12 48 3c 9e 0c eb 6b 97 |t..j...<.H<...k.|
00000010 a2 57 52 04 ba 5d f6 52 1e 2d 76 e2 d7 82 14 57 |.WR..].R.-v....W|
[1cb0 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 60 a3 87 20 4e 27 11 c6 e4 1b c3 |0D. z`.. N'.....|
00000010 c6 ab 89 c3 61 79 de 26 0f b9 8e 1b 13 7e f6 7d |....ay.&.....~.}|
00000020 af 13 b2 32 02 20 1a d7 50 42 1e 18 a5 80 f7 42 |...2. ..PB.....B|
00000030 49 b6 7d 21 6a ed 1d 73 fc d9 0e 8b 91 ae b3 d7 |I.}!j..s........|
00000040 5a 9c ec a2 53 2f |Z...S/|
[1cb1 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1cb2 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a4e000 gate 1578074118183208200 evaluation starts
[1cb3 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a4e000 signed by 0 principal evaluation starts (used [false])
[1cb4 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a4e000 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1cb5 01-03 17:55:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a4e000 principal evaluation succeeds for identity 0
[1cb7 01-03 17:55:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a4e000 gate 1578074118183208200 evaluation succeeds
[1cb8 01-03 17:55:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1cb6 01-03 17:55:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1cb9 01-03 17:55:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1cba 01-03 17:55:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1cbb 01-03 17:55:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1cbc 01-03 17:55:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1cbd 01-03 17:55:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1cbe 01-03 17:55:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes]}
[1cbf 01-03 17:55:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33
[1cc0 01-03 17:55:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33
[1cc1 01-03 17:55:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1cc2 01-03 17:55:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cc3 01-03 17:55:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cc4 01-03 17:55:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cc5 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cc6 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1cc7 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cc8 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cc9 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cca 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ccb 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ccc 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ccd 01-03 17:55:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cce 01-03 17:55:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1ccf 01-03 17:55:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cd0 01-03 17:55:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1cd1 01-03 17:55:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cd2 01-03 17:55:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cd3 01-03 17:55:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1cd4 01-03 17:55:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1cd5 01-03 17:55:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1cd6 01-03 17:55:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1cd7 01-03 17:55:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cd8 01-03 17:55:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cd9 01-03 17:55:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cda 01-03 17:55:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cdb 01-03 17:55:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cdc 01-03 17:55:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1cdd 01-03 17:55:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cde 01-03 17:55:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1cdf 01-03 17:55:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ce0 01-03 17:55:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315101E
[1ce1 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F82883BE7C1AD78EAB3172B6D3B516182BF8DDE6DEAB6B182A29712880498375
[1ce2 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1ce3 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1ce4 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[1ce5 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ce6 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ce7 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ce8 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1ce9 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cea 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1ceb 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1cec 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[1ced 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cee 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1cef 01-03 17:55:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cf0 01-03 17:55:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1cf1 01-03 17:55:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cf2 01-03 17:55:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1cf3 01-03 17:55:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1cf4 01-03 17:55:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cf5 01-03 17:55:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cf6 01-03 17:55:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cf7 01-03 17:55:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cf8 01-03 17:55:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:10906435526637334880 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1cf9 01-03 17:55:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10906435526637334880 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1cfa 01-03 17:55:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1cfb 01-03 17:55:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cfc 01-03 17:55:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1cfd 01-03 17:55:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cfe 01-03 17:55:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1cff 01-03 17:55:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1d00 01-03 17:55:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 1f 5b fc fc 86 b8 72 ef 0f 5c 3a eb 20 46 fb |Q.[....r..\:. F.|
00000010 35 1a e9 9a 1e 7f cc ad e4 24 21 e3 27 66 2b 30 |5........$!.'f+0|
[1d01 01-03 17:55:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 7a 91 3a 2f d0 e0 61 52 2e 8c 5b |0D. 6z.:/..aR..[|
00000010 94 f8 c6 78 51 c2 d6 be 57 95 8f bb 66 ef ca 59 |...xQ...W...f..Y|
00000020 09 70 fd 64 02 20 3e 0c 50 33 3f 9f 3d 79 0a c3 |.p.d. >.P3?.=y..|
00000030 b3 27 61 3c 90 3b b6 94 55 cf 97 da f8 61 e0 d3 |.'a<.;..U....a..|
00000040 14 18 45 2d 35 b2 |..E-5.|
[1d02 01-03 17:55:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1d03 01-03 17:55:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 e8 0e d1 bd 3a 60 f8 bf 8c fa af |0D. R....:`.....|
00000010 d2 d7 ee d6 04 b2 82 5d d5 4f fb fa 64 a3 67 85 |.......].O..d.g.|
00000020 61 7a 61 3c 02 20 06 dc 6a 7c 9c f3 03 17 84 0d |aza<. ..j|......|
00000030 a2 6d 1c da 59 18 73 dd 85 50 2b 45 1a 73 17 94 |.m..Y.s..P+E.s..|
00000040 32 d3 cb e9 89 a4 |2.....|
[1d04 01-03 17:55:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1d05 01-03 17:55:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[1d06 01-03 17:55:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34
[1d07 01-03 17:55:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34
[1d08 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[1d09 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d0a 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d0b 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d0c 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1d0d 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d0e 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d0f 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers
[1d10 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1d11 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[1d12 01-03 17:55:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d13 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:9290807930427232049 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1d14 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:9290807930427232049 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1d15 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9290807930427232049 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1d16 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d17 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d18 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d19 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d1a 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d1b 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d1c 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[1d1d 01-03 17:55:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d1e 01-03 17:55:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is go: downloading github.com/hyperledger/fabric-chaincode-go v0.0.0-20190823162523-04390e015b85
go: downloading github.com/hyperledger/fabric-protos-go v0.0.0-20190823190507-26c33c998676
go: extracting github.com/hyperledger/fabric-chaincode-go v0.0.0-20190823162523-04390e015b85
go: downloading github.com/golang/protobuf v1.3.2
go: downloading google.golang.org/grpc v1.24.0
go: extracting github.com/golang/protobuf v1.3.2
go: extracting github.com/hyperledger/fabric-protos-go v0.0.0-20190823190507-26c33c998676
go: extracting google.golang.org/grpc v1.24.0
go: downloading google.golang.org/genproto v0.0.0-20180831171423-11092d34479b
go: downloading golang.org/x/net v0.0.0-20190522155817-f3200d17e092
go: downloading golang.org/x/sys v0.0.0-20190710143415-6ec70d6a5542
go: extracting golang.org/x/net v0.0.0-20190522155817-f3200d17e092
go: downloading golang.org/x/text v0.3.0
go: extracting golang.org/x/sys v0.0.0-20190710143415-6ec70d6a5542
go: extracting google.golang.org/genproto v0.0.0-20180831171423-11092d34479b
go: extracting golang.org/x/text v0.3.0
go: finding github.com/hyperledger/fabric-chaincode-go v0.0.0-20190823162523-04390e015b85
go: finding github.com/hyperledger/fabric-protos-go v0.0.0-20190823190507-26c33c998676
go: finding github.com/golang/protobuf v1.3.2
go: finding google.golang.org/grpc v1.24.0
go: finding google.golang.org/genproto v0.0.0-20180831171423-11092d34479b
go: finding golang.org/x/net v0.0.0-20190522155817-f3200d17e092
go: finding golang.org/x/sys v0.0.0-20190710143415-6ec70d6a5542
go: finding golang.org/x/text v0.3.0
github.com/golang/protobuf/proto
golang.org/x/net/internal/timeseries
golang.org/x/net/trace
google.golang.org/grpc/grpclog
google.golang.org/grpc/connectivity
google.golang.org/grpc/credentials/internal
google.golang.org/grpc/internal
google.golang.org/grpc/metadata
google.golang.org/grpc/serviceconfig
google.golang.org/grpc/resolver
google.golang.org/grpc/internal/grpcrand
google.golang.org/grpc/codes
google.golang.org/grpc/encoding
google.golang.org/grpc/internal/backoff
google.golang.org/grpc/internal/balancerload
golang.org/x/sys/unix
github.com/golang/protobuf/ptypes/timestamp
github.com/hyperledger/fabric-protos-go/msp
github.com/hyperledger/fabric-protos-go/common
github.com/hyperledger/fabric-protos-go/ledger/rwset
google.golang.org/grpc/credentials
google.golang.org/grpc/balancer
google.golang.org/grpc/balancer/base
google.golang.org/grpc/balancer/roundrobin
google.golang.org/grpc/encoding/proto
github.com/golang/protobuf/ptypes/any
github.com/golang/protobuf/ptypes/duration
google.golang.org/genproto/googleapis/rpc/status
github.com/golang/protobuf/ptypes
google.golang.org/grpc/binarylog/grpc_binarylog_v1
google.golang.org/grpc/status
google.golang.org/grpc/internal/channelz
google.golang.org/grpc/internal/binarylog
google.golang.org/grpc/internal/envconfig
google.golang.org/grpc/internal/grpcsync
golang.org/x/text/transform
golang.org/x/text/unicode/bidi
golang.org/x/text/unicode/norm
golang.org/x/text/secure/bidirule
golang.org/x/net/http2/hpack
google.golang.org/grpc/internal/syscall
google.golang.org/grpc/keepalive
google.golang.org/grpc/peer
google.golang.org/grpc/stats
golang.org/x/net/idna
google.golang.org/grpc/tap
google.golang.org/grpc/naming
google.golang.org/grpc/resolver/dns
google.golang.org/grpc/resolver/passthrough
golang.org/x/net/http/httpguts
github.com/hyperledger/fabric-protos-go/ledger/queryresult
golang.org/x/net/http2
google.golang.org/grpc/internal/transport
google.golang.org/grpc
github.com/hyperledger/fabric-protos-go/peer
github.com/hyperledger/fabric-chaincode-go/shim/internal
github.com/hyperledger/fabric-chaincode-go/shim
examples/chaincode/go/chaincode_example02
# examples/chaincode/go/chaincode_example02
/usr/bin/ld: /tmp/go-link-148354924/000004.o: in function `_cgo_26061493d47f_C2func_getaddrinfo':
/tmp/go-build/cgo-gcc-prolog:58: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking
Done!
[1d1f 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13985484179261713268 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1d20 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:13985484179261713268 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1d21 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13985484179261713268 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1d22 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d23 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d24 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d25 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d26 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d27 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d28 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1d29 01-03 17:55:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d2a 01-03 17:55:21.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1d2b 01-03 17:55:21.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1d2c 01-03 17:55:21.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d2d 01-03 17:55:21.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1d2e 01-03 17:55:21.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[1d2f 01-03 17:55:21.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d30 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1d31 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1d32 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1d33 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1d34 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1d35 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1d36 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 6b 2d 59 4a cc 15 53 35 c5 08 03 99 81 64 75 | k-YJ..S5.....du|
00000010 1f 06 38 78 87 78 c8 b4 d4 32 bc 9f c3 10 12 45 |..8x.x...2.....E|
[1d37 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 4c 2f 76 a8 19 8a 7f ff 7c bb |0E.!..L/v.....|.|
00000010 2f e3 81 80 bb 7d e4 75 45 b1 13 bc 76 95 b8 6e |/....}.uE...v..n|
00000020 3c 3b 09 52 47 02 20 58 4f e1 11 03 4d c2 d2 21 |<;.RG. XO...M..!|
00000030 58 c8 b0 af fc f8 26 8a 3c 1c 70 d7 f3 22 fc c8 |X.....&.<.p.."..|
00000040 a6 76 a6 af 03 86 ec |.v.....|
[1d38 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1d39 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab1800 gate 1578074121080371700 evaluation starts
[1d3a 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab1800 signed by 0 principal evaluation starts (used [false])
[1d3b 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab1800 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1d3c 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab1800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1d3d 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab1800 principal evaluation fails
[1d3e 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab1800 gate 1578074121080371700 evaluation fails
[1d3f 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1d40 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1d41 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1d42 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 6b 2d 59 4a cc 15 53 35 c5 08 03 99 81 64 75 | k-YJ..S5.....du|
00000010 1f 06 38 78 87 78 c8 b4 d4 32 bc 9f c3 10 12 45 |..8x.x...2.....E|
[1d43 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 4c 2f 76 a8 19 8a 7f ff 7c bb |0E.!..L/v.....|.|
00000010 2f e3 81 80 bb 7d e4 75 45 b1 13 bc 76 95 b8 6e |/....}.uE...v..n|
00000020 3c 3b 09 52 47 02 20 58 4f e1 11 03 4d c2 d2 21 |<;.RG. XO...M..!|
00000030 58 c8 b0 af fc f8 26 8a 3c 1c 70 d7 f3 22 fc c8 |X.....&.<.p.."..|
00000040 a6 76 a6 af 03 86 ec |.v.....|
[1d44 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1d45 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042da100 gate 1578074121080819800 evaluation starts
[1d46 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042da100 signed by 0 principal evaluation starts (used [false])
[1d47 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042da100 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1d48 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042da100 principal evaluation succeeds for identity 0
[1d49 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042da100 gate 1578074121080819800 evaluation succeeds
[1d4a 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1d4b 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1d4c 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1d4d 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1d4e 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1d4f 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}
[1d50 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34
[1d51 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34
[1d52 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1d53 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d54 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d55 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d56 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1d57 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d58 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d59 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d5a 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[1d5b 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1d5c 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1d5d 01-03 17:55:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d5e 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1d5f 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1d60 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d61 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1d62 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1d63 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d64 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1d65 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1d66 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1d67 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1d68 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1d69 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1d6a 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 9f fa 52 68 0d db 4d 07 6f 88 e2 bc f0 a6 a2 |u..Rh..M.o......|
00000010 4c f5 e4 f1 58 c7 30 53 78 d5 7a a8 ed e0 06 30 |L...X.0Sx.z....0|
[1d6b 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 eb 21 af 74 73 6c 53 85 e2 0c |0E.!...!.tslS...|
00000010 4c 80 e2 3f 83 55 cf 3f 22 b9 95 97 f8 7a 9c 3e |L..?.U.?"....z.>|
00000020 9a 63 11 a3 a1 02 20 22 b6 8f 78 a2 7f 1e e8 cb |.c.... "..x.....|
00000030 81 5b 3b fa 6a 6d c3 e7 fa c4 b9 5d ac fa 1a 65 |.[;.jm.....]...e|
00000040 5e 50 68 be 93 f2 49 |^Ph...I|
[1d6c 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1d6d 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91040 gate 1578074121113316600 evaluation starts
[1d6e 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91040 signed by 0 principal evaluation starts (used [false])
[1d6f 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91040 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1d70 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1d71 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91040 principal evaluation fails
[1d72 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91040 gate 1578074121113316600 evaluation fails
[1d73 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1d74 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1d75 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1d76 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 9f fa 52 68 0d db 4d 07 6f 88 e2 bc f0 a6 a2 |u..Rh..M.o......|
00000010 4c f5 e4 f1 58 c7 30 53 78 d5 7a a8 ed e0 06 30 |L...X.0Sx.z....0|
[1d77 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 eb 21 af 74 73 6c 53 85 e2 0c |0E.!...!.tslS...|
00000010 4c 80 e2 3f 83 55 cf 3f 22 b9 95 97 f8 7a 9c 3e |L..?.U.?"....z.>|
00000020 9a 63 11 a3 a1 02 20 22 b6 8f 78 a2 7f 1e e8 cb |.c.... "..x.....|
00000030 81 5b 3b fa 6a 6d c3 e7 fa c4 b9 5d ac fa 1a 65 |.[;.jm.....]...e|
00000040 5e 50 68 be 93 f2 49 |^Ph...I|
[1d78 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1d79 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a919a0 gate 1578074121114780500 evaluation starts
[1d7a 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a919a0 signed by 0 principal evaluation starts (used [false])
[1d7b 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a919a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1d7c 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a919a0 principal evaluation succeeds for identity 0
[1d7d 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a919a0 gate 1578074121114780500 evaluation succeeds
[1d7e 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1d7f 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1d80 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1d81 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1d82 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[1d83 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes]}
[1d84 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32
[1d85 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32
[1d86 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1d87 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d88 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d89 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d8a 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[1d8b 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d8c 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d8d 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d8e 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[1d8f 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1d90 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1d91 01-03 17:55:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d92 01-03 17:55:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[1d93 01-03 17:55:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5726541246818255522 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1d94 01-03 17:55:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[1d95 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5858708551092891736 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1d96 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[1d97 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2270019042098115369 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1d98 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5726541246818255522 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1d99 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2270019042098115369 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1d9a 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d9b 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d9c 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5858708551092891736 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1d9d 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d9e 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5858708551092891736 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[1d9f 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5858708551092891736 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[1da0 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5858708551092891736 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[1da1 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1da2 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2270019042098115369 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[1da3 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2270019042098115369 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[1da4 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2270019042098115369 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[1da5 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1da6 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5726541246818255522 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[1da7 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5726541246818255522 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[1da8 01-03 17:55:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1da9 01-03 17:55:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315101F
[1daa 01-03 17:55:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC99052328E647E4DB3969ACD3AF8037EE20914B014014633848B49798667EDB
[1dab 01-03 17:55:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1dac 01-03 17:55:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1dad 01-03 17:55:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dae 01-03 17:55:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[1daf 01-03 17:55:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1db0 01-03 17:55:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1db1 01-03 17:55:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1db2 01-03 17:55:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[1db3 01-03 17:55:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1db4 01-03 17:55:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1db5 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1db6 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1db7 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1db8 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1db9 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1dba 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 99 05 23 28 e6 47 e4 db 39 69 ac d3 af 80 37 |...#(.G..9i....7|
00000010 ee 20 91 4b 01 40 14 63 38 48 b4 97 98 66 7e db |. .K.@.c8H...f~.|
[1dbb 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 d1 0c 75 db 4c 07 17 93 02 6e 46 |0D. (..u.L....nF|
00000010 f4 9e e9 f3 ba ae de b0 0a b8 a6 5e 88 d8 1c 09 |...........^....|
00000020 50 6d 82 55 02 20 76 50 2a 43 53 e4 11 ce d4 a0 |Pm.U. vP*CS.....|
00000030 5a f8 42 08 62 8b 6d df f6 ef 5f 59 a2 7e e5 60 |Z.B.b.m..._Y.~.`|
00000040 83 55 17 6a 78 c6 |.U.jx.|
[1dbc 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1dbd 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1dbe 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1dbf 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1dc0 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 1f 5b fc fc 86 b8 72 ef 0f 5c 3a eb 20 46 fb |Q.[....r..\:. F.|
00000010 35 1a e9 9a 1e 7f cc ad e4 24 21 e3 27 66 2b 30 |5........$!.'f+0|
[1dc1 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 7a 91 3a 2f d0 e0 61 52 2e 8c 5b |0D. 6z.:/..aR..[|
00000010 94 f8 c6 78 51 c2 d6 be 57 95 8f bb 66 ef ca 59 |...xQ...W...f..Y|
00000020 09 70 fd 64 02 20 3e 0c 50 33 3f 9f 3d 79 0a c3 |.p.d. >.P3?.=y..|
00000030 b3 27 61 3c 90 3b b6 94 55 cf 97 da f8 61 e0 d3 |.'a<.;..U....a..|
00000040 14 18 45 2d 35 b2 |..E-5.|
[1dc2 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes
[1dc3 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1dc4 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1dc5 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dc6 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1dc7 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1dc8 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1dc9 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1dca 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1dcb 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1dcc 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 9f fa 52 68 0d db 4d 07 6f 88 e2 bc f0 a6 a2 |u..Rh..M.o......|
00000010 4c f5 e4 f1 58 c7 30 53 78 d5 7a a8 ed e0 06 30 |L...X.0Sx.z....0|
[1dcd 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 eb 21 af 74 73 6c 53 85 e2 0c |0E.!...!.tslS...|
00000010 4c 80 e2 3f 83 55 cf 3f 22 b9 95 97 f8 7a 9c 3e |L..?.U.?"....z.>|
00000020 9a 63 11 a3 a1 02 20 22 b6 8f 78 a2 7f 1e e8 cb |.c.... "..x.....|
00000030 81 5b 3b fa 6a 6d c3 e7 fa c4 b9 5d ac fa 1a 65 |.[;.jm.....]...e|
00000040 5e 50 68 be 93 f2 49 |^Ph...I|
[1dce 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1dcf 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039faaf0 gate 1578074121297706600 evaluation starts
[1dd0 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039faaf0 signed by 0 principal evaluation starts (used [false])
[1dd1 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039faaf0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1dd2 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039faaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1dd3 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039faaf0 principal evaluation fails
[1dd4 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039faaf0 gate 1578074121297706600 evaluation fails
[1dd5 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1dd6 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1dd7 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1dd8 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 9f fa 52 68 0d db 4d 07 6f 88 e2 bc f0 a6 a2 |u..Rh..M.o......|
00000010 4c f5 e4 f1 58 c7 30 53 78 d5 7a a8 ed e0 06 30 |L...X.0Sx.z....0|
[1dd9 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 eb 21 af 74 73 6c 53 85 e2 0c |0E.!...!.tslS...|
00000010 4c 80 e2 3f 83 55 cf 3f 22 b9 95 97 f8 7a 9c 3e |L..?.U.?"....z.>|
00000020 9a 63 11 a3 a1 02 20 22 b6 8f 78 a2 7f 1e e8 cb |.c.... "..x.....|
00000030 81 5b 3b fa 6a 6d c3 e7 fa c4 b9 5d ac fa 1a 65 |.[;.jm.....]...e|
00000040 5e 50 68 be 93 f2 49 |^Ph...I|
[1dda 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ddb 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb3f0 gate 1578074121298228200 evaluation starts
[1ddc 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb3f0 signed by 0 principal evaluation starts (used [false])
[1ddd 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb3f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1dde 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb3f0 principal evaluation succeeds for identity 0
[1ddf 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb3f0 gate 1578074121298228200 evaluation succeeds
[1de0 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1de1 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1de2 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1de3 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1de4 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[1de5 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1de6 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1de7 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1de8 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1de9 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1dea 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1deb 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[1dec 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ded 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1dee 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1def 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1df0 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1df1 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1df2 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1df3 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 6b 2d 59 4a cc 15 53 35 c5 08 03 99 81 64 75 | k-YJ..S5.....du|
00000010 1f 06 38 78 87 78 c8 b4 d4 32 bc 9f c3 10 12 45 |..8x.x...2.....E|
[1df4 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 4c 2f 76 a8 19 8a 7f ff 7c bb |0E.!..L/v.....|.|
00000010 2f e3 81 80 bb 7d e4 75 45 b1 13 bc 76 95 b8 6e |/....}.uE...v..n|
00000020 3c 3b 09 52 47 02 20 58 4f e1 11 03 4d c2 d2 21 |<;.RG. XO...M..!|
00000030 58 c8 b0 af fc f8 26 8a 3c 1c 70 d7 f3 22 fc c8 |X.....&.<.p.."..|
00000040 a6 76 a6 af 03 86 ec |.v.....|
[1df5 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1df6 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961640 gate 1578074121299884400 evaluation starts
[1df7 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961640 signed by 0 principal evaluation starts (used [false])
[1df8 01-03 17:55:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961640 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1df9 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1dfa 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961640 principal evaluation fails
[1dfb 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961640 gate 1578074121299884400 evaluation fails
[1dfc 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1dfd 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1dfe 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1dff 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 6b 2d 59 4a cc 15 53 35 c5 08 03 99 81 64 75 | k-YJ..S5.....du|
00000010 1f 06 38 78 87 78 c8 b4 d4 32 bc 9f c3 10 12 45 |..8x.x...2.....E|
[1e00 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 4c 2f 76 a8 19 8a 7f ff 7c bb |0E.!..L/v.....|.|
00000010 2f e3 81 80 bb 7d e4 75 45 b1 13 bc 76 95 b8 6e |/....}.uE...v..n|
00000020 3c 3b 09 52 47 02 20 58 4f e1 11 03 4d c2 d2 21 |<;.RG. XO...M..!|
00000030 58 c8 b0 af fc f8 26 8a 3c 1c 70 d7 f3 22 fc c8 |X.....&.<.p.."..|
00000040 a6 76 a6 af 03 86 ec |.v.....|
[1e01 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e02 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961f40 gate 1578074121300458000 evaluation starts
[1e03 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961f40 signed by 0 principal evaluation starts (used [false])
[1e04 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961f40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1e05 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961f40 principal evaluation succeeds for identity 0
[1e06 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961f40 gate 1578074121300458000 evaluation succeeds
[1e07 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1e08 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1e09 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1e0a 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1e0b 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1e0c 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e0d 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[1e0e 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1e0f 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1e10 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e11 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 1f 5b fc fc 86 b8 72 ef 0f 5c 3a eb 20 46 fb |Q.[....r..\:. F.|
00000010 35 1a e9 9a 1e 7f cc ad e4 24 21 e3 27 66 2b 30 |5........$!.'f+0|
[1e12 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 7a 91 3a 2f d0 e0 61 52 2e 8c 5b |0D. 6z.:/..aR..[|
00000010 94 f8 c6 78 51 c2 d6 be 57 95 8f bb 66 ef ca 59 |...xQ...W...f..Y|
00000020 09 70 fd 64 02 20 3e 0c 50 33 3f 9f 3d 79 0a c3 |.p.d. >.P3?.=y..|
00000030 b3 27 61 3c 90 3b b6 94 55 cf 97 da f8 61 e0 d3 |.'a<.;..U....a..|
00000040 14 18 45 2d 35 b2 |..E-5.|
[1e13 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes
[1e14 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e15 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1e16 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 99 05 23 28 e6 47 e4 db 39 69 ac d3 af 80 37 |...#(.G..9i....7|
00000010 ee 20 91 4b 01 40 14 63 38 48 b4 97 98 66 7e db |. .K.@.c8H...f~.|
[1e17 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 d1 0c 75 db 4c 07 17 93 02 6e 46 |0D. (..u.L....nF|
00000010 f4 9e e9 f3 ba ae de b0 0a b8 a6 5e 88 d8 1c 09 |...........^....|
00000020 50 6d 82 55 02 20 76 50 2a 43 53 e4 11 ce d4 a0 |Pm.U. vP*CS.....|
00000030 5a f8 42 08 62 8b 6d df f6 ef 5f 59 a2 7e e5 60 |Z.B.b.m..._Y.~.`|
00000040 83 55 17 6a 78 c6 |.U.jx.|
[1e18 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1e19 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1e1a 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e1b 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e1c 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[1e1d 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e1e 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[1e1f 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[1e20 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 99 05 23 28 e6 47 e4 db 39 69 ac d3 af 80 37 |...#(.G..9i....7|
00000010 ee 20 91 4b 01 40 14 63 38 48 b4 97 98 66 7e db |. .K.@.c8H...f~.|
[1e21 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 d1 0c 75 db 4c 07 17 93 02 6e 46 |0D. (..u.L....nF|
00000010 f4 9e e9 f3 ba ae de b0 0a b8 a6 5e 88 d8 1c 09 |...........^....|
00000020 50 6d 82 55 02 20 76 50 2a 43 53 e4 11 ce d4 a0 |Pm.U. vP*CS.....|
00000030 5a f8 42 08 62 8b 6d df f6 ef 5f 59 a2 7e e5 60 |Z.B.b.m..._Y.~.`|
00000040 83 55 17 6a 78 c6 |.U.jx.|
[1e22 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1e23 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 cb 0b 8e 80 0e a1 a0 1d 45 c5 10 |0D. b........E..|
00000010 42 27 30 47 e8 0c 3c b6 7e 61 fc 15 08 47 3a 04 |B'0G..<.~a...G:.|
00000020 18 a9 63 2f 02 20 5b 51 87 ab 86 ed 21 40 3e 67 |..c/. [Q....!@>g|
00000030 97 f6 c3 46 93 87 7c 12 88 aa 6d f6 4a 2a b1 6d |...F..|...m.J*.m|
00000040 3d 46 d5 1c e8 a8 |=F....|
[1e24 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1e25 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1e26 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e27 01-03 17:55:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e28 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e29 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e2a 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1e2b 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1e2c 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e2d 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1e2e 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e2f 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[1e30 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e31 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1e32 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1e33 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e34 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e35 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e36 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1e37 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1e38 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1e39 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1e3a 01-03 17:55:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1e3b 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1e3c 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1e3d 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1e3e 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e3f 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836f30 gate 1578074121480588000 evaluation starts
[1e40 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836f30 signed by 0 principal evaluation starts (used [false])
[1e41 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836f30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1e42 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1e43 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836f30 principal evaluation fails
[1e44 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836f30 gate 1578074121480588000 evaluation fails
[1e45 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1e46 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1e47 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1e48 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1e49 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1e4a 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e4b 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837840 gate 1578074121480988100 evaluation starts
[1e4c 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1e4d 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837840 signed by 0 principal evaluation starts (used [false])
[1e4e 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837840 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1e4f 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837840 principal evaluation succeeds for identity 0
[1e50 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837840 gate 1578074121480988100 evaluation succeeds
[1e51 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1e52 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1e53 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1e54 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1e55 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1e56 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1e57 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e58 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e59 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1e5a 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1e5b 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1e5c 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1e5d 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1e5e 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1e5f 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1e60 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1e61 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e62 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e5a80 gate 1578074121482924200 evaluation starts
[1e63 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e5a80 signed by 0 principal evaluation starts (used [false])
[1e64 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e5a80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1e65 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e5a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1e66 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e5a80 principal evaluation fails
[1e67 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e5a80 gate 1578074121482924200 evaluation fails
[1e68 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1e69 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1e6a 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1e6b 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1e6c 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1e6d 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e6e 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003768440 gate 1578074121483327200 evaluation starts
[1e6f 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003768440 signed by 0 principal evaluation starts (used [false])
[1e70 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003768440 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1e71 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003768440 principal evaluation succeeds for identity 0
[1e72 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003768440 gate 1578074121483327200 evaluation succeeds
[1e73 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1e74 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1e75 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1e76 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1e77 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1e78 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1e79 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e7a 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1e7b 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1e7c 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1e7d 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1e7e 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1e7f 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e80 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e81 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1e82 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1e83 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1e84 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1e85 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1e86 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1e87 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1e88 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1e89 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e8a 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d5c0 gate 1578074121485377600 evaluation starts
[1e8b 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d5c0 signed by 0 principal evaluation starts (used [false])
[1e8c 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d5c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1e8d 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1e8e 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d5c0 principal evaluation fails
[1e8f 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d5c0 gate 1578074121485377600 evaluation fails
[1e90 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1e91 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1e92 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1e93 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1e94 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1e95 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e96 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746030 gate 1578074121485959400 evaluation starts
[1e97 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746030 signed by 0 principal evaluation starts (used [false])
[1e98 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746030 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1e99 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746030 principal evaluation succeeds for identity 0
[1e9a 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746030 gate 1578074121485959400 evaluation succeeds
[1e9b 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1e9c 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1e9d 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1e9e 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1e9f 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ea0 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ea1 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1ea2 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1ea3 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1ea4 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1ea5 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1ea6 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1ea7 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1ea8 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1ea9 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1eaa 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747c20 gate 1578074121488882700 evaluation starts
[1eab 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747c20 signed by 0 principal evaluation starts (used [false])
[1eac 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747c20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1ead 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1eae 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747c20 principal evaluation fails
[1eaf 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747c20 gate 1578074121488882700 evaluation fails
[1eb0 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1eb1 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1eb2 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1eb3 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1eb4 01-03 17:55:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1eb5 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1eb6 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003734520 gate 1578074121490072100 evaluation starts
[1eb7 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003734520 signed by 0 principal evaluation starts (used [false])
[1eb8 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003734520 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1eb9 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003734520 principal evaluation succeeds for identity 0
[1eba 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003734520 gate 1578074121490072100 evaluation succeeds
[1ebb 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1ebc 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1ebd 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1ebe 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1ebf 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ec0 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[1ec1 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ec2 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ec3 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ec4 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1ec5 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1ec6 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1ec7 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1ec8 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1ec9 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1eca 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1ecb 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1ecc 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ecd 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ec380 gate 1578074121492250500 evaluation starts
[1ece 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ec380 signed by 0 principal evaluation starts (used [false])
[1ecf 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ec380 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1ed0 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ec380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1ed1 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ec380 principal evaluation fails
[1ed2 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ec380 gate 1578074121492250500 evaluation fails
[1ed3 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ed4 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ed5 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1ed6 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[1ed7 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[1ed8 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ed9 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecd90 gate 1578074121493850100 evaluation starts
[1eda 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecd90 signed by 0 principal evaluation starts (used [false])
[1edb 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecd90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1edc 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecd90 principal evaluation succeeds for identity 0
[1edd 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecd90 gate 1578074121493850100 evaluation succeeds
[1ede 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1edf 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1ee0 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1ee1 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1ee2 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[1ee3 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[1ee4 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[1ee5 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[1ee6 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ee7 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ee8 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1ee9 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1eea 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1eeb 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1eec 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1eed 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1eee 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1eef 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1ef0 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ef1 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036996a0 gate 1578074121495340800 evaluation starts
[1ef2 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036996a0 signed by 0 principal evaluation starts (used [false])
[1ef3 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036996a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1ef4 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036996a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1ef5 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036996a0 principal evaluation fails
[1ef6 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036996a0 gate 1578074121495340800 evaluation fails
[1ef7 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ef8 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ef9 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1efa 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[1efb 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[1efc 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1efd 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003699fa0 gate 1578074121495815500 evaluation starts
[1efe 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003699fa0 signed by 0 principal evaluation starts (used [false])
[1eff 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003699fa0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1f00 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003699fa0 principal evaluation succeeds for identity 0
[1f01 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003699fa0 gate 1578074121495815500 evaluation succeeds
[1f02 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1f03 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1f04 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1f05 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1f06 01-03 17:55:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f07 01-03 17:55:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[1f08 01-03 17:55:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[1f09 01-03 17:55:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510081801
[1f0a 01-03 17:55:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 39F078A8BBA3D20EC05DC1ED60CC47FB5780FBB42C84B53D8CB34C4F9C89F544
[1f0b 01-03 17:55:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[1f0c 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f0d 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f0e 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f0f 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f10 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1f11 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f12 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f13 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[1f14 01-03 17:55:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f15 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f16 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f17 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1f18 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f19 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f1a 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17173272723837708622 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[1f1b 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17173272723837708622 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1f1c 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f1d 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17173272723837708622 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[1f1e 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17173272723837708622 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[1f1f 01-03 17:55:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f20 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 1622645798679055166, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:13 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 280 bytes, Signature: 0 bytes
[1f21 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f22 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 1622645798679055166, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:13 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 280 bytes, Signature: 0 bytes
[1f23 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1f24 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 66 2e 77 33 8c 5a 35 5d bd c8 02 7a 44 11 80 |.f.w3.Z5]...zD..|
00000010 79 64 2f 8e 10 69 33 12 9d d7 af 65 62 bf c3 ab |yd/..i3....eb...|
[1f25 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 e7 13 60 dc 4d d7 c6 d2 35 80 87 |0D. H..`.M...5..|
00000010 36 cc 0e e2 6c a3 98 9a ba 0e af 71 1f 6a 34 06 |6...l......q.j4.|
00000020 c0 22 ee df 02 20 4a dc a8 f2 35 31 02 02 be 47 |."... J...51...G|
00000030 c2 9c 24 99 00 5c af 54 59 56 a3 af e4 55 60 0e |..$..\.TYV...U`.|
00000040 7a 43 51 c9 a7 61 |zCQ..a|
[1f26 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1f27 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 2d a8 f6 5f 9f e4 18 cf 67 2c e9 |0D. s-.._....g,.|
00000010 02 a6 6a 1a c4 a5 03 53 f6 7f 76 b9 4c ef df 03 |..j....S..v.L...|
00000020 86 eb ee d9 02 20 3a 8c 6f c8 05 dc 14 21 a0 c8 |..... :.o....!..|
00000030 fa a4 a1 aa c6 45 53 d9 fb 7b 22 79 68 0d 9e 81 |.....ES..{"yh...|
00000040 ab 4d de 8e f2 57 |.M...W|
[1f28 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f29 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1f2a 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f2b 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f2c 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1622645798679055166, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes to 1 peers
[1f2d 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1f2e 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1622645798679055166, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes
[1f2f 01-03 17:55:21.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f30 01-03 17:55:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[1f31 01-03 17:55:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f32 01-03 17:55:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f33 01-03 17:55:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f34 01-03 17:55:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 688659604506149235, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 280 bytes, Signature: 0 bytes
[1f35 01-03 17:55:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f36 01-03 17:55:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 688659604506149235, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 280 bytes, Signature: 0 bytes
[1f37 01-03 17:55:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1f38 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 90 66 c3 2f 7d 37 e8 34 14 b4 b3 6e ab 9e f0 |+.f./}7.4...n...|
00000010 f5 51 ec d8 5a 79 d0 ee 8f 46 51 25 86 9d 01 55 |.Q..Zy...FQ%...U|
[1f39 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f c3 66 36 d9 61 cc 13 c0 f2 c3 41 |0D. ?.f6.a.....A|
00000010 06 b1 76 bc ef ad eb 65 5c 85 6f b9 46 40 17 40 |..v....e\.o.F@.@|
00000020 e0 8a a3 f0 02 20 47 2d a0 30 c2 c1 c0 29 4f 1a |..... G-.0...)O.|
00000030 d2 e4 df 03 93 8e 71 ba 15 de 42 a5 09 13 2a d0 |......q...B...*.|
00000040 b9 6b 69 d1 d4 6b |.ki..k|
[1f3a 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1f3b 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 9e 99 68 4e cb 32 36 16 47 28 ad |0D. V..hN.26.G(.|
00000010 ac 86 50 aa a5 54 f7 16 c7 b8 9e 9b 2e f7 61 d8 |..P..T........a.|
00000020 2f 5f d0 69 02 20 23 de 85 c2 c9 b9 c5 28 69 7c |/_.i. #......(i||
00000030 d3 a3 9d 80 eb 5b 95 fb 7a b0 06 52 53 b6 ee cc |.....[..z..RS...|
00000040 2a d2 e3 75 19 bb |*..u..|
[1f3c 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f3d 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1f3e 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f3f 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f41 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 688659604506149235, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes to 1 peers
[1f42 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1f43 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 688659604506149235, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes
[1f44 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f40 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10710786474597164340 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1f45 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10710786474597164340 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1f46 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[1f47 01-03 17:55:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f48 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1f49 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f4a 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1f4b 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[1f4c 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 6a 99 2a ff c4 7f de 12 98 c1 08 97 48 54 f2 |.j.*.........HT.|
00000010 ef e2 83 bb 0d 47 c1 de a8 66 5f a7 8c 69 37 5f |.....G...f_..i7_|
[1f4d 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 ed 46 41 56 8a 60 1c 5f 17 49 cf |0D. ..FAV.`._.I.|
00000010 41 93 c0 9c c0 d8 b6 c6 6a 76 e1 9e fa b0 0b 7b |A.......jv.....{|
00000020 99 9b 90 3e 02 20 3c 2f 35 be 7a ed 2c cc 80 98 |...>. </5.z.,...|
00000030 5f 7e e2 64 8f ae bc eb b3 b6 76 bd 86 f5 9a d9 |_~.d......v.....|
00000040 5b 0a 8e 3e a3 e2 |[..>..|
[1f4e 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1f4f 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f d2 cd 25 3b 87 6d 73 82 ce 09 2a |0D. ?..%;.ms...*|
00000010 81 9f 8b 3a ef a7 69 c8 c9 64 c3 8a 55 c1 66 55 |...:..i..d..U.fU|
00000020 5a 85 d0 c3 02 20 7a a5 ad 10 d8 f3 49 2b 76 59 |Z.... z.....I+vY|
00000030 99 c6 95 b3 2e 99 91 92 95 f8 fd 35 06 df f9 0a |...........5....|
00000040 9e 19 cc e6 ac 3f |.....?|
[1f50 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1f51 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[1f52 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35
[1f53 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35
[1f54 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[1f55 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f56 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f57 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f58 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f59 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f5a 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f5b 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1f5c 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f5d 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1f5e 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[1f5f 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f60 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[1f61 01-03 17:55:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f62 01-03 17:55:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[1f63 01-03 17:55:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[1f64 01-03 17:55:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f65 01-03 17:55:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[1f66 01-03 17:55:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f67 01-03 17:55:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1f68 01-03 17:55:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[1f69 01-03 17:55:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f6a 01-03 17:55:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f6b 01-03 17:55:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f6c 01-03 17:55:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f6d 01-03 17:55:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1f6e 01-03 17:55:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[1f6f 01-03 17:55:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f70 01-03 17:55:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f71 01-03 17:55:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f72 01-03 17:55:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f73 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 15829883107168789961, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1f74 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 15829883107168789961, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1f75 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f76 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 15829883107168789961, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1f77 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1f78 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f79 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1f7a 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1f7b 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1f7c 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1f7d 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1f7e 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1f7f 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 90 1a 29 1c 73 10 98 44 df 8c fb 95 d3 8c 72 |...).s..D......r|
00000010 ff aa 4a 2d 2b e6 23 5b 97 ee 2d 24 e5 f5 7d 31 |..J-+.#[..-$..}1|
[1f80 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 d6 72 37 96 a8 59 79 3e ce ce |0E.!...r7..Yy>..|
00000010 dc 58 cf 9c 6a bd b5 fb da 5e fe 1d bb 13 d8 f1 |.X..j....^......|
00000020 eb 6d 2b 2b 29 02 20 2d cc 5e 21 79 88 fe 13 d8 |.m++). -.^!y....|
00000030 01 d9 85 88 bf 31 7e 19 53 46 95 0a 87 1c fd 82 |.....1~.SF......|
00000040 6e 81 58 14 1b 7b 43 |n.X..{C|
[1f81 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1f82 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb220 gate 1578074122534331200 evaluation starts
[1f83 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb220 signed by 0 principal evaluation starts (used [false])
[1f84 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb220 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1f85 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1f86 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb220 principal evaluation fails
[1f87 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033eb220 gate 1578074122534331200 evaluation fails
[1f88 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1f89 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1f8a 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1f8b 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 90 1a 29 1c 73 10 98 44 df 8c fb 95 d3 8c 72 |...).s..D......r|
00000010 ff aa 4a 2d 2b e6 23 5b 97 ee 2d 24 e5 f5 7d 31 |..J-+.#[..-$..}1|
[1f8c 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 d6 72 37 96 a8 59 79 3e ce ce |0E.!...r7..Yy>..|
00000010 dc 58 cf 9c 6a bd b5 fb da 5e fe 1d bb 13 d8 f1 |.X..j....^......|
00000020 eb 6d 2b 2b 29 02 20 2d cc 5e 21 79 88 fe 13 d8 |.m++). -.^!y....|
00000030 01 d9 85 88 bf 31 7e 19 53 46 95 0a 87 1c fd 82 |.....1~.SF......|
00000040 6e 81 58 14 1b 7b 43 |n.X..{C|
[1f8d 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1f8e 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ebb20 gate 1578074122537286900 evaluation starts
[1f8f 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ebb20 signed by 0 principal evaluation starts (used [false])
[1f90 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ebb20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1f91 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ebb20 principal evaluation succeeds for identity 0
[1f92 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ebb20 gate 1578074122537286900 evaluation succeeds
[1f93 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1f94 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1f95 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1f96 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1f97 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f98 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[1f99 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f9a 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f9b 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f9c 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 15829883107168789961, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers
[1f9d 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1f9e 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15829883107168789961, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes
[1f9f 01-03 17:55:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fa0 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 18349163237421330545, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1fa1 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 18349163237421330545, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1fa2 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fa3 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 18349163237421330545, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1fa4 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[1fa5 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fa6 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1fa7 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1fa8 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1fa9 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1faa 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1fab 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1fac 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b e8 c1 4b 60 35 dc 32 2a 7a 41 80 69 e5 dc 10 |[..K`5.2*zA.i...|
00000010 95 59 01 31 2a 9d 4c a4 97 3c a3 a2 10 45 33 05 |.Y.1*.L..<...E3.|
[1fad 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 65 a0 d8 53 57 91 db 55 61 92 |0E.!..e..SW..Ua.|
00000010 f7 7c 7b 9f 2a ef 85 d8 3f 82 98 4f be 33 9d d3 |.|{.*...?..O.3..|
00000020 aa f0 de 1a 00 02 20 3a ca 70 cc 84 6e 48 14 eb |...... :.p..nH..|
00000030 29 d8 11 2d 3e 7f a2 0f 3d 11 ee 6d fb 09 30 3c |)..->...=..m..0<|
00000040 71 23 22 5b db 2d 59 |q#"[.-Y|
[1fae 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1faf 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a390 gate 1578074122798462000 evaluation starts
[1fb0 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a390 signed by 0 principal evaluation starts (used [false])
[1fb1 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a390 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1fb2 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1fb3 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a390 principal evaluation fails
[1fb4 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331a390 gate 1578074122798462000 evaluation fails
[1fb5 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1fb6 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1fb7 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1fb8 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b e8 c1 4b 60 35 dc 32 2a 7a 41 80 69 e5 dc 10 |[..K`5.2*zA.i...|
00000010 95 59 01 31 2a 9d 4c a4 97 3c a3 a2 10 45 33 05 |.Y.1*.L..<...E3.|
[1fb9 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 65 a0 d8 53 57 91 db 55 61 92 |0E.!..e..SW..Ua.|
00000010 f7 7c 7b 9f 2a ef 85 d8 3f 82 98 4f be 33 9d d3 |.|{.*...?..O.3..|
00000020 aa f0 de 1a 00 02 20 3a ca 70 cc 84 6e 48 14 eb |...... :.p..nH..|
00000030 29 d8 11 2d 3e 7f a2 0f 3d 11 ee 6d fb 09 30 3c |)..->...=..m..0<|
00000040 71 23 22 5b db 2d 59 |q#"[.-Y|
[1fba 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1fbb 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331acd0 gate 1578074122799022700 evaluation starts
[1fbc 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331acd0 signed by 0 principal evaluation starts (used [false])
[1fbd 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331acd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[1fbe 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331acd0 principal evaluation succeeds for identity 0
[1fbf 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331acd0 gate 1578074122799022700 evaluation succeeds
[1fc0 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1fc1 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1fc2 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1fc3 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1fc4 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fc5 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[1fc6 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fc7 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fc8 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fc9 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 18349163237421330545, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers
[1fca 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1fcb 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 18349163237421330545, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes
[1fcc 01-03 17:55:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fcd 01-03 17:55:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[1fce 01-03 17:55:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[1fcf 01-03 17:55:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fd0 01-03 17:55:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[1fd1 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[1fd2 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fd3 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[1fd4 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[1fd5 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1fd6 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1fd7 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1fd8 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1fd9 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1fda 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1fdb 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 5e ef 05 53 76 15 86 bf 62 ed 15 79 1d d1 61 |.^..Sv...b..y..a|
00000010 81 4b 1e 5c b0 75 39 78 50 00 c9 ca 0f 15 78 66 |.K.\.u9xP.....xf|
[1fdc 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ad 3b 0f 5b e7 88 c3 01 a7 74 |0E.!...;.[.....t|
00000010 e1 e2 d5 22 ea dc 66 ad 87 15 db 98 fe 78 96 2d |..."..f......x.-|
00000020 7d 8f 3c 79 3d 02 20 31 20 a6 4a b3 11 fa 94 36 |}.<y=. 1 .J....6|
00000030 d1 43 dd ed dc bd c0 45 e3 4a f1 8f cd db 2e 54 |.C.....E.J.....T|
00000040 50 29 09 b7 25 b9 14 |P)..%..|
[1fdd 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1fde 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290fd0 gate 1578074123038288200 evaluation starts
[1fdf 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290fd0 signed by 0 principal evaluation starts (used [false])
[1fe0 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290fd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1fe1 01-03 17:55:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1fe2 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290fd0 principal evaluation fails
[1fe3 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290fd0 gate 1578074123038288200 evaluation fails
[1fe4 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1fe5 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1fe6 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1fe7 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 5e ef 05 53 76 15 86 bf 62 ed 15 79 1d d1 61 |.^..Sv...b..y..a|
00000010 81 4b 1e 5c b0 75 39 78 50 00 c9 ca 0f 15 78 66 |.K.\.u9xP.....xf|
[1fe8 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ad 3b 0f 5b e7 88 c3 01 a7 74 |0E.!...;.[.....t|
00000010 e1 e2 d5 22 ea dc 66 ad 87 15 db 98 fe 78 96 2d |..."..f......x.-|
00000020 7d 8f 3c 79 3d 02 20 31 20 a6 4a b3 11 fa 94 36 |}.<y=. 1 .J....6|
00000030 d1 43 dd ed dc bd c0 45 e3 4a f1 8f cd db 2e 54 |.C.....E.J.....T|
00000040 50 29 09 b7 25 b9 14 |P)..%..|
[1fe9 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1fea 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032919f0 gate 1578074123044669000 evaluation starts
[1feb 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032919f0 signed by 0 principal evaluation starts (used [false])
[1fec 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032919f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[1fed 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032919f0 principal evaluation succeeds for identity 0
[1fee 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032919f0 gate 1578074123044669000 evaluation succeeds
[1fef 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1ff0 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1ff1 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1ff2 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1ff3 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[1ff4 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}
[1ff5 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33
[1ff6 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33
[1ff7 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1ff8 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ff9 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ffa 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ffb 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[1ffc 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ffd 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ffe 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[1fff 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2000 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2001 01-03 17:55:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2002 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2003 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2004 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2005 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2006 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2007 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2008 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2009 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[200a 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[200b 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[200c 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[200d 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[200e 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[200f 01-03 17:55:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2010 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2011 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2012 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2013 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2014 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2015 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2016 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2017 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2018 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2019 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[201a 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[201b 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[201c 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 81 47 ae 61 0a f7 b2 a8 f0 37 72 b8 5a 69 b8 |..G.a.....7r.Zi.|
00000010 d1 6c 86 e6 c7 11 7b 3c ea 7a b7 53 86 25 90 1d |.l....{<.z.S.%..|
[201d 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 a6 89 39 ed ea a1 4b 2c 90 2d e1 |0D. ...9...K,.-.|
00000010 aa da 5d 64 28 a3 74 d2 74 e2 d0 61 27 da b0 fe |..]d(.t.t..a'...|
00000020 8b a8 ac 45 02 20 07 32 0d e4 2f b5 35 02 20 9d |...E. .2../.5. .|
00000030 f3 b9 3e f6 58 aa 6e f9 c1 a8 89 70 f9 d5 15 9b |..>.X.n....p....|
00000040 39 0e 88 aa c5 08 |9.....|
[201e 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[201f 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b630 gate 1578074123086540400 evaluation starts
[2020 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b630 signed by 0 principal evaluation starts (used [false])
[2021 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b630 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2022 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2023 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b630 principal evaluation fails
[2024 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b630 gate 1578074123086540400 evaluation fails
[2025 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2026 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2027 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2028 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 81 47 ae 61 0a f7 b2 a8 f0 37 72 b8 5a 69 b8 |..G.a.....7r.Zi.|
00000010 d1 6c 86 e6 c7 11 7b 3c ea 7a b7 53 86 25 90 1d |.l....{<.z.S.%..|
[2029 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 a6 89 39 ed ea a1 4b 2c 90 2d e1 |0D. ...9...K,.-.|
00000010 aa da 5d 64 28 a3 74 d2 74 e2 d0 61 27 da b0 fe |..]d(.t.t..a'...|
00000020 8b a8 ac 45 02 20 07 32 0d e4 2f b5 35 02 20 9d |...E. .2../.5. .|
00000030 f3 b9 3e f6 58 aa 6e f9 c1 a8 89 70 f9 d5 15 9b |..>.X.n....p....|
00000040 39 0e 88 aa c5 08 |9.....|
[202a 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[202b 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328bf70 gate 1578074123086962100 evaluation starts
[202c 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328bf70 signed by 0 principal evaluation starts (used [false])
[202d 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328bf70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[202e 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328bf70 principal evaluation succeeds for identity 0
[202f 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328bf70 gate 1578074123086962100 evaluation succeeds
[2030 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2031 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2032 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2033 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2034 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2035 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes]}
[2036 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35
[2037 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35
[2038 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2039 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[203a 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[203b 01-03 17:55:23.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[203c 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[203d 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[203e 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[203f 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2040 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2041 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2042 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2043 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2044 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2045 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2046 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2047 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2048 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2049 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[204a 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[204b 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[204c 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[204d 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[204e 01-03 17:55:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[204f 01-03 17:55:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2050 01-03 17:55:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2051 01-03 17:55:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2052 01-03 17:55:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2053 01-03 17:55:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[2054 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151020
[2055 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3E35369136EBE8E93905C10D22AA3E975E40E68DCA69B4F9C24DF35EC395DB63
[2056 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2057 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2058 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2059 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[205a 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[205b 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[205c 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[205d 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[205e 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[205f 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[2060 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2061 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2062 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[2063 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2064 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[2065 01-03 17:55:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2066 01-03 17:55:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:16409181635542299520 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2067 01-03 17:55:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16409181635542299520 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2068 01-03 17:55:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2069 01-03 17:55:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[206a 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[206b 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[206c 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[206d 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[206e 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 d3 9d 1d 58 7e 29 0c e1 fb f1 53 63 ab 25 93 |7...X~)....Sc.%.|
00000010 d4 dd 47 64 c8 ed 7c de 72 18 58 7e de c1 e7 d9 |..Gd..|.r.X~....|
[206f 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 a6 46 b4 31 d4 87 95 9c 0d 26 |0E.!...F.1.....&|
00000010 bf fa 89 16 7b 36 4c 79 0f 70 bd b7 64 f7 ef 2d |....{6Ly.p..d..-|
00000020 55 43 10 60 c8 02 20 77 46 a2 4c 25 4a 5a 94 22 |UC.`.. wF.L%JZ."|
00000030 a1 ea 9b 7c d2 89 72 01 2c 32 b9 91 75 71 32 68 |...|..r.,2..uq2h|
00000040 42 00 1a ba 5e 3a d3 |B...^:.|
[2070 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2071 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 cc 42 b5 d0 66 34 cc 18 7e 1c |0E.!...B..f4..~.|
00000010 cc 7f 91 63 ba 8b b8 11 f2 5f fc b3 54 27 00 f0 |...c....._..T'..|
00000020 c0 a0 c6 b5 b3 02 20 71 35 4e c7 c9 c7 25 b2 7f |...... q5N...%..|
00000030 0f 73 6c 96 c0 58 be ec 57 97 98 75 42 98 b4 cb |.sl..X..W..uB...|
00000040 76 f7 a1 f7 b6 11 25 |v.....%|
[2072 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2073 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[2074 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36
[2075 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36
[2076 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[2077 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2078 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2079 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[207a 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[207b 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[207c 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[207d 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers
[207e 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[207f 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[2080 01-03 17:55:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2081 01-03 17:55:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13093044592081722987 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2082 01-03 17:55:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:13093044592081722987 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2083 01-03 17:55:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13093044592081722987 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2084 01-03 17:55:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2085 01-03 17:55:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2086 01-03 17:55:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2087 01-03 17:55:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2088 01-03 17:55:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2089 01-03 17:55:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[208a 01-03 17:55:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[208b 01-03 17:55:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[208c 01-03 17:55:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6906339460255520508 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[208d 01-03 17:55:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:6906339460255520508 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[208e 01-03 17:55:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6906339460255520508 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[208f 01-03 17:55:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2090 01-03 17:55:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2091 01-03 17:55:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2092 01-03 17:55:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2093 01-03 17:55:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2094 01-03 17:55:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2095 01-03 17:55:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[2096 01-03 17:55:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2097 01-03 17:55:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2098 01-03 17:55:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2099 01-03 17:55:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[209a 01-03 17:55:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[209b 01-03 17:55:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[209c 01-03 17:55:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[209d 01-03 17:55:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[209e 01-03 17:55:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[209f 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[20a0 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[20a1 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[20a2 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[20a3 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 0a 3a c7 84 f1 a5 44 5e 3d e7 c5 89 0a da e7 |..:....D^=......|
00000010 5f 7d 65 69 98 ce 34 2d e7 f6 a7 e3 e4 62 84 29 |_}ei..4-.....b.)|
[20a4 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e d4 07 94 21 ce a2 d9 39 a9 10 97 |0D. N...!...9...|
00000010 32 7f 2c df 64 3f 42 47 61 81 e1 5d 75 23 ac 13 |2.,.d?BGa..]u#..|
00000020 a9 f3 be 28 02 20 40 73 a4 bb 7b e4 69 b4 d5 10 |...(. @s..{.i...|
00000030 78 28 5d 9a ff 59 39 4a 34 cb f1 73 70 1e 8e be |x(]..Y9J4..sp...|
00000040 a0 0e 01 cd 17 71 |.....q|
[20a5 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[20a6 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ce10 gate 1578074125083257900 evaluation starts
[20a7 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ce10 signed by 0 principal evaluation starts (used [false])
[20a8 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ce10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[20a9 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ce10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[20aa 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ce10 principal evaluation fails
[20ab 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ce10 gate 1578074125083257900 evaluation fails
[20ac 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[20ad 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[20ae 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[20af 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 0a 3a c7 84 f1 a5 44 5e 3d e7 c5 89 0a da e7 |..:....D^=......|
00000010 5f 7d 65 69 98 ce 34 2d e7 f6 a7 e3 e4 62 84 29 |_}ei..4-.....b.)|
[20b0 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e d4 07 94 21 ce a2 d9 39 a9 10 97 |0D. N...!...9...|
00000010 32 7f 2c df 64 3f 42 47 61 81 e1 5d 75 23 ac 13 |2.,.d?BGa..]u#..|
00000020 a9 f3 be 28 02 20 40 73 a4 bb 7b e4 69 b4 d5 10 |...(. @s..{.i...|
00000030 78 28 5d 9a ff 59 39 4a 34 cb f1 73 70 1e 8e be |x(]..Y9J4..sp...|
00000040 a0 0e 01 cd 17 71 |.....q|
[20b1 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[20b2 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d840 gate 1578074125083929600 evaluation starts
[20b3 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d840 signed by 0 principal evaluation starts (used [false])
[20b4 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d840 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[20b5 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d840 principal evaluation succeeds for identity 0
[20b6 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d840 gate 1578074125083929600 evaluation succeeds
[20b7 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[20b8 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[20b9 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[20ba 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[20bb 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes
[20bc 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes]}
[20bd 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36
[20be 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36
[20bf 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[20c0 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20c1 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20c2 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20c3 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[20c4 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20c5 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20c6 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20c7 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[20c8 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[20c9 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[20ca 01-03 17:55:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20cb 01-03 17:55:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff-909f98f3f6999083cb8988aca7f359042d80b8fb1e46d52baf63a30abd85b8de
[20cc 01-03 17:55:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU skipping build of chaincode 'exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff' as it is already in progress
[20cd 01-03 17:55:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU ProcessInstallEvent() - localChaincode = &{exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff golang examples/chaincode/go/chaincode_example02 exp02}
[20ce 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[20cf 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[20d0 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20d1 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[20d2 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[20d3 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20d4 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[20d5 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[20d6 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[20d7 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[20d8 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[20d9 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[20da 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 dd cc 24 32 9f a5 3e cb 7e 76 f7 8d 3e db b2 |...$2..>.~v..>..|
00000010 cb 76 15 41 8a b2 de 26 3e 6c f4 f6 64 8e a6 ab |.v.A...&>l..d...|
[20db 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 0e c3 62 44 6d f8 dd 32 a9 4a |0E.!....bDm..2.J|
00000010 77 c6 69 04 f1 de 6f 41 3a e0 be 50 55 98 8b 97 |w.i...oA:..PU...|
00000020 09 ed 65 ac af 02 20 3e 64 67 6c 1d de ed 01 80 |..e... >dgl.....|
00000030 00 67 6a a9 85 28 87 77 27 da 7e 91 5a 34 bd a3 |.gj..(.w'.~.Z4..|
00000040 4f a0 e1 3f 3b 71 8c |O..?;q.|
[20dc 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[20dd 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030889e0 gate 1578074125114553200 evaluation starts
[20de 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030889e0 signed by 0 principal evaluation starts (used [false])
[20df 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030889e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[20e0 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030889e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[20e1 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030889e0 principal evaluation fails
[20e2 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030889e0 gate 1578074125114553200 evaluation fails
[20e3 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[20e4 01-03 17:55:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[20e5 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[20e6 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 dd cc 24 32 9f a5 3e cb 7e 76 f7 8d 3e db b2 |...$2..>.~v..>..|
00000010 cb 76 15 41 8a b2 de 26 3e 6c f4 f6 64 8e a6 ab |.v.A...&>l..d...|
[20e7 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 0e c3 62 44 6d f8 dd 32 a9 4a |0E.!....bDm..2.J|
00000010 77 c6 69 04 f1 de 6f 41 3a e0 be 50 55 98 8b 97 |w.i...oA:..PU...|
00000020 09 ed 65 ac af 02 20 3e 64 67 6c 1d de ed 01 80 |..e... >dgl.....|
00000030 00 67 6a a9 85 28 87 77 27 da 7e 91 5a 34 bd a3 |.gj..(.w'.~.Z4..|
00000040 4f a0 e1 3f 3b 71 8c |O..?;q.|
[20e8 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[20e9 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030892e0 gate 1578074125125065000 evaluation starts
[20ea 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030892e0 signed by 0 principal evaluation starts (used [false])
[20eb 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030892e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[20ec 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030892e0 principal evaluation succeeds for identity 0
[20ed 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030892e0 gate 1578074125125065000 evaluation succeeds
[20ee 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[20ef 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[20f0 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[20f1 01-03 17:55:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[20f2 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[20f3 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}
[20f4 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34
[20f5 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34
[20f6 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[20f7 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20f8 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20f9 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20fa 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[20fb 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20fc 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20fd 01-03 17:55:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20fe 01-03 17:55:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[20ff 01-03 17:55:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2100 01-03 17:55:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2101 01-03 17:55:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2102 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[2103 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10379845351612941292 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2104 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2105 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2782028486644389884 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2106 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[2107 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13716598190898770576 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2108 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13716598190898770576 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2109 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[210a 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10379845351612941292 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[210b 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[210c 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2782028486644389884 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[210d 01-03 17:55:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[210e 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13716598190898770576 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[210f 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13716598190898770576 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[2110 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13716598190898770576 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[2111 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2112 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2782028486644389884 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[2113 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2782028486644389884 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[2114 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2115 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10379845351612941292 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2116 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10379845351612941292 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2117 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10379845351612941292 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2118 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2119 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar
[211a 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> INFO successfully installed chaincode with package ID 'exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff'
[211b 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU [04389aaf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[211c 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU [04389aaf] notifying Txid:04389aafea42ef3b4c4f104984ad6ccd78921cd3bfcd127a39baab9b5728a2fd, channelID:
[211d 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[211e 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> INFO [][04389aaf] Exit chaincode: _lifecycle (28699ms)
[211f 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU [][04389aaf] Exit
[2120 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57482
[2121 01-03 17:55:25.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57482 grpc.code=OK grpc.call_duration=28.7218011s
[2122 01-03 17:55:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[2123 01-03 17:55:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[2124 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151021
[2125 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 36E95EAE68DE7ACA48DACD86DCB7ED6516A6A68E04AD2770B20B3F3CED99E021
[2126 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2127 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2128 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[2129 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[212a 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[212b 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[212c 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[212d 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[212f 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[212e 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[2130 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2131 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2132 01-03 17:55:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2133 01-03 17:55:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2134 01-03 17:55:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2135 01-03 17:55:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2136 01-03 17:55:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2137 01-03 17:55:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2138 01-03 17:55:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2139 01-03 17:55:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[213a 01-03 17:55:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[213b 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[213c 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[213d 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[213e 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[213f 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2140 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2141 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 dd cc 24 32 9f a5 3e cb 7e 76 f7 8d 3e db b2 |...$2..>.~v..>..|
00000010 cb 76 15 41 8a b2 de 26 3e 6c f4 f6 64 8e a6 ab |.v.A...&>l..d...|
[2142 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 0e c3 62 44 6d f8 dd 32 a9 4a |0E.!....bDm..2.J|
00000010 77 c6 69 04 f1 de 6f 41 3a e0 be 50 55 98 8b 97 |w.i...oA:..PU...|
00000020 09 ed 65 ac af 02 20 3e 64 67 6c 1d de ed 01 80 |..e... >dgl.....|
00000030 00 67 6a a9 85 28 87 77 27 da 7e 91 5a 34 bd a3 |.gj..(.w'.~.Z4..|
00000040 4f a0 e1 3f 3b 71 8c |O..?;q.|
[2143 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2144 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246440 gate 1578074125343211900 evaluation starts
[2145 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246440 signed by 0 principal evaluation starts (used [false])
[2146 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246440 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2147 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2148 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246440 principal evaluation fails
[2149 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246440 gate 1578074125343211900 evaluation fails
[214a 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[214b 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[214c 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[214d 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 dd cc 24 32 9f a5 3e cb 7e 76 f7 8d 3e db b2 |...$2..>.~v..>..|
00000010 cb 76 15 41 8a b2 de 26 3e 6c f4 f6 64 8e a6 ab |.v.A...&>l..d...|
[214e 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 0e c3 62 44 6d f8 dd 32 a9 4a |0E.!....bDm..2.J|
00000010 77 c6 69 04 f1 de 6f 41 3a e0 be 50 55 98 8b 97 |w.i...oA:..PU...|
00000020 09 ed 65 ac af 02 20 3e 64 67 6c 1d de ed 01 80 |..e... >dgl.....|
00000030 00 67 6a a9 85 28 87 77 27 da 7e 91 5a 34 bd a3 |.gj..(.w'.~.Z4..|
00000040 4f a0 e1 3f 3b 71 8c |O..?;q.|
[214f 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2150 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246fc0 gate 1578074125344704900 evaluation starts
[2151 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246fc0 signed by 0 principal evaluation starts (used [false])
[2152 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246fc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2153 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246fc0 principal evaluation succeeds for identity 0
[2154 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000246fc0 gate 1578074125344704900 evaluation succeeds
[2155 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2156 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2157 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2158 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2159 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[215a 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[215b 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[215c 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 e9 5e ae 68 de 7a ca 48 da cd 86 dc b7 ed 65 |6.^.h.z.H......e|
00000010 16 a6 a6 8e 04 ad 27 70 b2 0b 3f 3c ed 99 e0 21 |......'p..?<...!|
[215d 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 21 75 4e 81 32 04 dd 34 45 6e 7c |0D. 0!uN.2..4En||
00000010 e2 7e dd 7b ed 67 d4 77 33 fe e4 66 f3 f7 97 2e |.~.{.g.w3..f....|
00000020 de ce 23 e9 02 20 6c 0b 4f 91 87 54 32 16 ff 90 |..#.. l.O..T2...|
00000030 d9 6b 40 14 41 07 87 3c a0 78 57 70 b9 3a a7 67 |.k@.A..<.xWp.:.g|
00000040 b4 e9 1c e3 10 a1 |......|
[215e 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[215f 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[2160 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2161 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2162 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 d3 9d 1d 58 7e 29 0c e1 fb f1 53 63 ab 25 93 |7...X~)....Sc.%.|
00000010 d4 dd 47 64 c8 ed 7c de 72 18 58 7e de c1 e7 d9 |..Gd..|.r.X~....|
[2163 01-03 17:55:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 a6 46 b4 31 d4 87 95 9c 0d 26 |0E.!...F.1.....&|
00000010 bf fa 89 16 7b 36 4c 79 0f 70 bd b7 64 f7 ef 2d |....{6Ly.p..d..-|
00000020 55 43 10 60 c8 02 20 77 46 a2 4c 25 4a 5a 94 22 |UC.`.. wF.L%JZ."|
00000030 a1 ea 9b 7c d2 89 72 01 2c 32 b9 91 75 71 32 68 |...|..r.,2..uq2h|
00000040 42 00 1a ba 5e 3a d3 |B...^:.|
[2164 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[2165 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2166 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2167 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2168 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2169 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[216a 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[216b 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[216c 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[216d 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[216e 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[216f 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2170 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2171 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2172 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 0a 3a c7 84 f1 a5 44 5e 3d e7 c5 89 0a da e7 |..:....D^=......|
00000010 5f 7d 65 69 98 ce 34 2d e7 f6 a7 e3 e4 62 84 29 |_}ei..4-.....b.)|
[2173 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e d4 07 94 21 ce a2 d9 39 a9 10 97 |0D. N...!...9...|
00000010 32 7f 2c df 64 3f 42 47 61 81 e1 5d 75 23 ac 13 |2.,.d?BGa..]u#..|
00000020 a9 f3 be 28 02 20 40 73 a4 bb 7b e4 69 b4 d5 10 |...(. @s..{.i...|
00000030 78 28 5d 9a ff 59 39 4a 34 cb f1 73 70 1e 8e be |x(]..Y9J4..sp...|
00000040 a0 0e 01 cd 17 71 |.....q|
[2174 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2175 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e3c0 gate 1578074125354206900 evaluation starts
[2176 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e3c0 signed by 0 principal evaluation starts (used [false])
[2177 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e3c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2178 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2179 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e3c0 principal evaluation fails
[217a 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e3c0 gate 1578074125354206900 evaluation fails
[217b 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[217c 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[217d 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[217e 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 0a 3a c7 84 f1 a5 44 5e 3d e7 c5 89 0a da e7 |..:....D^=......|
00000010 5f 7d 65 69 98 ce 34 2d e7 f6 a7 e3 e4 62 84 29 |_}ei..4-.....b.)|
[217f 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e d4 07 94 21 ce a2 d9 39 a9 10 97 |0D. N...!...9...|
00000010 32 7f 2c df 64 3f 42 47 61 81 e1 5d 75 23 ac 13 |2.,.d?BGa..]u#..|
00000020 a9 f3 be 28 02 20 40 73 a4 bb 7b e4 69 b4 d5 10 |...(. @s..{.i...|
00000030 78 28 5d 9a ff 59 39 4a 34 cb f1 73 70 1e 8e be |x(]..Y9J4..sp...|
00000040 a0 0e 01 cd 17 71 |.....q|
[2180 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2181 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087ecc0 gate 1578074125356192900 evaluation starts
[2182 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087ecc0 signed by 0 principal evaluation starts (used [false])
[2183 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087ecc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2184 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087ecc0 principal evaluation succeeds for identity 0
[2185 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087ecc0 gate 1578074125356192900 evaluation succeeds
[2186 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2187 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2188 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2189 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[218a 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes
[218b 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[218c 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[218d 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 d3 9d 1d 58 7e 29 0c e1 fb f1 53 63 ab 25 93 |7...X~)....Sc.%.|
00000010 d4 dd 47 64 c8 ed 7c de 72 18 58 7e de c1 e7 d9 |..Gd..|.r.X~....|
[218e 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 a6 46 b4 31 d4 87 95 9c 0d 26 |0E.!...F.1.....&|
00000010 bf fa 89 16 7b 36 4c 79 0f 70 bd b7 64 f7 ef 2d |....{6Ly.p..d..-|
00000020 55 43 10 60 c8 02 20 77 46 a2 4c 25 4a 5a 94 22 |UC.`.. wF.L%JZ."|
00000030 a1 ea 9b 7c d2 89 72 01 2c 32 b9 91 75 71 32 68 |...|..r.,2..uq2h|
00000040 42 00 1a ba 5e 3a d3 |B...^:.|
[218f 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[2190 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2191 01-03 17:55:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2192 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 e9 5e ae 68 de 7a ca 48 da cd 86 dc b7 ed 65 |6.^.h.z.H......e|
00000010 16 a6 a6 8e 04 ad 27 70 b2 0b 3f 3c ed 99 e0 21 |......'p..?<...!|
[2193 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 21 75 4e 81 32 04 dd 34 45 6e 7c |0D. 0!uN.2..4En||
00000010 e2 7e dd 7b ed 67 d4 77 33 fe e4 66 f3 f7 97 2e |.~.{.g.w3..f....|
00000020 de ce 23 e9 02 20 6c 0b 4f 91 87 54 32 16 ff 90 |..#.. l.O..T2...|
00000030 d9 6b 40 14 41 07 87 3c a0 78 57 70 b9 3a a7 67 |.k@.A..<.xWp.:.g|
00000040 b4 e9 1c e3 10 a1 |......|
[2194 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[2195 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[2196 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2197 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2198 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[219a 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2199 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[219b 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 e9 5e ae 68 de 7a ca 48 da cd 86 dc b7 ed 65 |6.^.h.z.H......e|
00000010 16 a6 a6 8e 04 ad 27 70 b2 0b 3f 3c ed 99 e0 21 |......'p..?<...!|
[219c 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 21 75 4e 81 32 04 dd 34 45 6e 7c |0D. 0!uN.2..4En||
00000010 e2 7e dd 7b ed 67 d4 77 33 fe e4 66 f3 f7 97 2e |.~.{.g.w3..f....|
00000020 de ce 23 e9 02 20 6c 0b 4f 91 87 54 32 16 ff 90 |..#.. l.O..T2...|
00000030 d9 6b 40 14 41 07 87 3c a0 78 57 70 b9 3a a7 67 |.k@.A..<.xWp.:.g|
00000040 b4 e9 1c e3 10 a1 |......|
[219d 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[219e 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 3b 86 b9 71 df 22 ec 0e 06 af 2b |0D. J;..q."....+|
00000010 8b 76 66 77 bb 4c 49 28 d1 c3 f0 ba 0c 76 52 9b |.vfw.LI(.....vR.|
00000020 ba 0c 02 fa 02 20 19 a8 28 7f 19 c6 96 0f 12 f4 |..... ..(.......|
00000030 6e 46 1a 9a 5d 2f bf 0a 0a 1b 3c 4c 56 38 f5 57 |nF..]/....<LV8.W|
00000040 4e 90 b6 ac 25 30 |N...%0|
[219f 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[21a0 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[21a1 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21a2 01-03 17:55:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21a3 01-03 17:55:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21a4 01-03 17:55:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21a5 01-03 17:55:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[21a6 01-03 17:55:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[21a9 01-03 17:55:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21a7 01-03 17:55:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[21aa 01-03 17:55:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21a8 01-03 17:55:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[21ab 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21ac 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[21ae 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[21ad 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[21af 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21b0 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21b1 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21b2 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[21b3 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[21b4 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[21b5 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[21b6 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[21b7 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[21b8 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[21b9 01-03 17:55:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[21ba 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[21bb 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035cd20 gate 1578074125490517200 evaluation starts
[21bc 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035cd20 signed by 0 principal evaluation starts (used [false])
[21bd 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035cd20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[21be 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035cd20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[21bf 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035cd20 principal evaluation fails
[21c0 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035cd20 gate 1578074125490517200 evaluation fails
[21c1 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[21c2 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[21c3 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[21c4 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[21c5 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[21c6 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[21c7 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d810 gate 1578074125492196800 evaluation starts
[21c8 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d810 signed by 0 principal evaluation starts (used [false])
[21c9 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d810 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[21ca 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d810 principal evaluation succeeds for identity 0
[21cb 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035d810 gate 1578074125492196800 evaluation succeeds
[21cc 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[21cd 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[21ce 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[21cf 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[21d0 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[21d1 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[21d2 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[21d3 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[21d4 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21d5 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21d6 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[21d7 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[21d8 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[21d9 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[21da 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[21db 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[21dc 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[21dd 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[21de 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[21df 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a010 gate 1578074125499463400 evaluation starts
[21e0 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a010 signed by 0 principal evaluation starts (used [false])
[21e1 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a010 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[21e2 01-03 17:55:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[21e3 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a010 principal evaluation fails
[21e4 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a010 gate 1578074125499463400 evaluation fails
[21e5 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[21e6 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[21e7 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[21e8 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[21e9 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[21ea 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[21eb 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a970 gate 1578074125502555900 evaluation starts
[21ec 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a970 signed by 0 principal evaluation starts (used [false])
[21ed 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a970 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[21ee 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a970 principal evaluation succeeds for identity 0
[21ef 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030a970 gate 1578074125502555900 evaluation succeeds
[21f0 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[21f1 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[21f2 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[21f3 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[21f4 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21f5 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[21f6 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[21f7 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[21f8 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[21f9 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[21fa 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21fb 01-03 17:55:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21fc 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[21fd 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[21fe 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[21ff 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2200 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2201 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2202 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2203 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2204 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2205 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279660 gate 1578074125512365100 evaluation starts
[2206 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279660 signed by 0 principal evaluation starts (used [false])
[2207 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279660 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2208 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2209 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279660 principal evaluation fails
[220a 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000279660 gate 1578074125512365100 evaluation fails
[220b 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[220c 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[220d 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[220e 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[220f 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2210 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2211 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000262120 gate 1578074125512990100 evaluation starts
[2212 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000262120 signed by 0 principal evaluation starts (used [false])
[2213 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000262120 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2214 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000262120 principal evaluation succeeds for identity 0
[2215 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000262120 gate 1578074125512990100 evaluation succeeds
[2216 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2217 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2218 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2219 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[221a 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[221b 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[221c 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[221d 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[221e 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[221f 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2220 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2221 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2222 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2223 01-03 17:55:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2224 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2225 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263fd0 gate 1578074125525980300 evaluation starts
[2226 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263fd0 signed by 0 principal evaluation starts (used [false])
[2227 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263fd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2228 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2229 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263fd0 principal evaluation fails
[222a 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263fd0 gate 1578074125525980300 evaluation fails
[222b 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[222c 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[222d 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[222e 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[222f 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2230 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2231 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002328f0 gate 1578074125528413300 evaluation starts
[2232 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002328f0 signed by 0 principal evaluation starts (used [false])
[2233 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002328f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2234 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002328f0 principal evaluation succeeds for identity 0
[2235 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002328f0 gate 1578074125528413300 evaluation succeeds
[2236 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2237 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2238 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2239 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[223a 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[223b 01-03 17:55:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[223c 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[223d 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[223e 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[223f 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2240 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2241 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2242 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2243 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2244 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2245 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2246 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2247 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2248 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212980 gate 1578074125532301400 evaluation starts
[2249 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212980 signed by 0 principal evaluation starts (used [false])
[224a 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212980 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[224b 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[224c 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212980 principal evaluation fails
[224d 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212980 gate 1578074125532301400 evaluation fails
[224e 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[224f 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2250 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2251 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2252 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2253 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2254 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213280 gate 1578074125533418300 evaluation starts
[2255 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213280 signed by 0 principal evaluation starts (used [false])
[2256 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213280 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2257 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213280 principal evaluation succeeds for identity 0
[2258 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213280 gate 1578074125533418300 evaluation succeeds
[2259 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[225a 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[225b 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[225c 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[225d 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[225e 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[225f 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2260 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2261 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2262 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2263 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2264 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2265 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2266 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2267 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2268 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2269 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[226a 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed50 gate 1578074125534670700 evaluation starts
[226b 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed50 signed by 0 principal evaluation starts (used [false])
[226c 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed50 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[226d 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[226e 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed50 principal evaluation fails
[226f 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed50 gate 1578074125534670700 evaluation fails
[2270 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2271 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2272 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2273 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2274 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2275 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2276 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ff70 gate 1578074125535075700 evaluation starts
[2277 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ff70 signed by 0 principal evaluation starts (used [false])
[2278 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ff70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2279 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ff70 principal evaluation succeeds for identity 0
[227a 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ff70 gate 1578074125535075700 evaluation succeeds
[227b 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[227c 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[227d 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[227e 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[227f 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2280 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2281 01-03 17:55:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2282 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2283 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2284 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[2285 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2286 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2287 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2799002532619174119 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[2288 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2799002532619174119 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2289 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[228a 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2799002532619174119 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[228b 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2799002532619174119 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[228c 01-03 17:55:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[228d 01-03 17:55:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[228e 01-03 17:55:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[228f 01-03 17:55:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2290 01-03 17:55:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2291 01-03 17:55:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4717563209720400992 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2292 01-03 17:55:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4717563209720400992 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2293 01-03 17:55:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2294 01-03 17:55:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2295 01-03 17:55:26.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2296 01-03 17:55:26.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2297 01-03 17:55:26.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2298 01-03 17:55:26.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2299 01-03 17:55:26.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[229a 01-03 17:55:26.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[229b 01-03 17:55:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[229c 01-03 17:55:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[229d 01-03 17:55:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[229e 01-03 17:55:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[229f 01-03 17:55:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22a0 01-03 17:55:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22a1 01-03 17:55:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[22a2 01-03 17:55:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[22a3 01-03 17:55:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510091801
[22a4 01-03 17:55:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 49BA2D8A7F37D0469AB1338EC72B60BCFDD5FD1C4B2B087AD793D989F88E63EB
[22a5 01-03 17:55:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[22a6 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22a7 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22a8 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22a9 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22aa 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[22ab 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22ad 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22ac 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[22ae 01-03 17:55:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22af 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[22b0 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22b1 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[22b2 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[22b3 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 1e f1 a7 70 39 c6 1f 40 63 b2 d2 83 31 8c bf |'...p9..@c...1..|
00000010 04 d0 d6 27 c1 56 77 f6 03 3b 26 55 35 7e 9b 04 |...'.Vw..;&U5~..|
[22b4 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 f3 c3 d8 aa 16 6e c6 d4 4f d5 7a |0D. r.....n..O.z|
00000010 db 47 d4 1d eb cb 88 e9 6d 3a f6 7e 0e b8 67 2f |.G......m:.~..g/|
00000020 cd 86 8c c8 02 20 22 15 72 0f a2 3c 2c c1 af 74 |..... ".r..<,..t|
00000030 99 93 90 3d 85 ca a8 bb 9a 40 fc e1 48 a7 4c a1 |...=.....@..H.L.|
00000040 1e ec c8 e8 2b 76 |....+v|
[22b5 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[22b6 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 23 71 3e 94 9c 22 4a 3c 77 85 |0E.!..#q>.."J<w.|
00000010 17 fa 65 7b 7f 9f dc 88 53 a5 8f fa 45 99 bf 47 |..e{....S...E..G|
00000020 4c 78 5e fe 50 02 20 2c 36 0b 1c f1 28 d7 11 d9 |Lx^.P. ,6...(...|
00000030 0a 69 22 9b 24 c7 95 f1 2d 11 29 cf a6 83 02 b4 |.i".$...-.).....|
00000040 6d 47 4b 6b 39 d9 60 |mGKk9.`|
[22b7 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[22b8 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[22b9 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37
[22ba 01-03 17:55:26.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37
[22bb 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[22bc 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22bd 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22be 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22bf 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[22c0 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[22c1 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[22c2 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22c3 01-03 17:55:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22c4 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22c5 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22c6 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22c7 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[22c8 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22c9 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[22ca 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[22cb 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22cc 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[22cd 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22ce 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[22cf 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[22d0 01-03 17:55:26.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22d1 01-03 17:55:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[22d2 01-03 17:55:26.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22d3 01-03 17:55:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:12640895238521724195 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[22d4 01-03 17:55:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12640895238521724195 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[22d5 01-03 17:55:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[22d6 01-03 17:55:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22d7 01-03 17:55:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[22d8 01-03 17:55:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22d9 01-03 17:55:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[22da 01-03 17:55:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[22db 01-03 17:55:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 41 14 05 ff 8c 9b 33 00 c7 98 57 e8 3b 16 0a |.A.....3...W.;..|
00000010 b5 74 e8 c6 6e d4 0b a7 81 fb 36 40 f9 ad d1 74 |.t..n.....6@...t|
[22dc 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 48 b7 a7 6b 49 51 16 35 c6 d8 |0E.!..H..kIQ.5..|
00000010 87 d6 a8 7d 0f 2a 99 37 da 04 1f 4d 83 30 a9 a1 |...}.*.7...M.0..|
00000020 1a 2e 24 db 67 02 20 3c 92 e0 55 45 22 7d 0a 53 |..$.g. <..UE"}.S|
00000030 24 ee 6a 52 da c8 0e 5c cb 60 57 b5 4f 01 59 f9 |$.jR...\.`W.O.Y.|
00000040 a6 23 39 24 65 f5 9b |.#9$e..|
[22dd 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[22de 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 a7 0f 01 85 f6 8f ff bb f0 ed |0E.!............|
00000010 38 66 51 ab e5 eb 49 b2 76 6b ef c5 1a 8e 91 9d |8fQ...I.vk......|
00000020 eb 71 bd d2 ff 02 20 5c 76 27 a7 30 89 8b a2 22 |.q.... \v'.0..."|
00000030 ba 8c 34 43 95 4c 1f 9a a4 d2 a4 fc 52 7a 98 f4 |..4C.L......Rz..|
00000040 79 72 f3 a5 c0 c4 58 |yr....X|
[22df 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[22e0 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[22e1 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38
[22e2 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38
[22e3 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[22e4 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22e5 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22e6 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[22e7 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22e8 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22e9 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers
[22ea 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[22eb 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[22ec 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22ed 01-03 17:55:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22ee 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[22ef 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[22f0 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22f1 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[22f2 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[22f3 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22f4 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[22f5 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[22f6 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[22f7 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[22f8 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[22f9 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[22fa 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf b0 e6 e2 95 30 24 4b 90 36 d7 c2 70 26 27 a2 |.....0$K.6..p&'.|
00000010 b7 71 49 14 c1 de 54 94 ac cf 74 27 20 84 bb 7a |.qI...T...t' ..z|
[22fb 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 b5 07 e0 15 52 13 06 3c 38 07 3f |0D. .....R..<8.?|
00000010 73 ce 06 75 e1 b5 9a 47 78 4b b8 5e 4d 3d 44 33 |s..u...GxK.^M=D3|
00000020 03 77 6b 7c 02 20 29 58 1e 29 4e 14 93 4f b5 5c |.wk|. )X.)N..O.\|
00000030 25 83 a8 ad 37 db de b9 55 b6 0e 76 aa 8b e9 c7 |%...7...U..v....|
00000040 5d b7 5c 8d 54 e2 |].\.T.|
[22fc 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[22fd 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4250 gate 1578074128013000700 evaluation starts
[22fe 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4250 signed by 0 principal evaluation starts (used [false])
[22ff 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4250 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2300 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2301 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4250 principal evaluation fails
[2302 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4250 gate 1578074128013000700 evaluation fails
[2303 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2304 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2305 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2306 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf b0 e6 e2 95 30 24 4b 90 36 d7 c2 70 26 27 a2 |.....0$K.6..p&'.|
00000010 b7 71 49 14 c1 de 54 94 ac cf 74 27 20 84 bb 7a |.qI...T...t' ..z|
[2307 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 b5 07 e0 15 52 13 06 3c 38 07 3f |0D. .....R..<8.?|
00000010 73 ce 06 75 e1 b5 9a 47 78 4b b8 5e 4d 3d 44 33 |s..u...GxK.^M=D3|
00000020 03 77 6b 7c 02 20 29 58 1e 29 4e 14 93 4f b5 5c |.wk|. )X.)N..O.\|
00000030 25 83 a8 ad 37 db de b9 55 b6 0e 76 aa 8b e9 c7 |%...7...U..v....|
00000040 5d b7 5c 8d 54 e2 |].\.T.|
[2308 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2309 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4c30 gate 1578074128013576800 evaluation starts
[230a 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4c30 signed by 0 principal evaluation starts (used [false])
[230b 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4c30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[230c 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4c30 principal evaluation succeeds for identity 0
[230d 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4c30 gate 1578074128013576800 evaluation succeeds
[230e 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[230f 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2310 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2311 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2312 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2313 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes]}
[2314 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35
[2315 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35
[2316 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2317 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2318 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2319 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[231a 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[231b 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[231c 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[231d 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[231e 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[231f 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2320 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2321 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2322 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2323 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2324 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2325 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2326 01-03 17:55:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2327 01-03 17:55:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2328 01-03 17:55:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2329 01-03 17:55:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[232a 01-03 17:55:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[232b 01-03 17:55:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[232c 01-03 17:55:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[232d 01-03 17:55:28.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[232e 01-03 17:55:28.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[232f 01-03 17:55:28.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2330 01-03 17:55:28.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2331 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2332 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2333 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2334 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2335 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2336 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2337 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2338 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2339 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[233a 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[233b 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[233c 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[233d 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 b7 99 40 24 5f 45 8d cb f9 8f ba 59 34 26 7c |&..@$_E.....Y4&||
00000010 61 0a aa 89 f4 69 51 8e 15 80 b1 88 ed a2 38 8e |a....iQ.......8.|
[233e 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a c8 47 4a 0f 95 f3 91 85 a6 a5 23 |0D. Z.GJ.......#|
00000010 97 64 ab cd c4 50 f2 fd 4d 78 0a 17 e0 58 fe 57 |.d...P..Mx...X.W|
00000020 4b a6 7d 6d 02 20 7a a0 ae f7 f9 8f 62 4e de 3b |K.}m. z.....bN.;|
00000030 5e 68 a3 a4 f4 71 83 07 ce 85 9a 32 35 f6 dd 58 |^h...q.....25..X|
00000040 2d 4b 4a 02 cd 3a |-KJ..:|
[233f 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2340 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c0b0 gate 1578074128079882900 evaluation starts
[2341 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c0b0 signed by 0 principal evaluation starts (used [false])
[2342 01-03 17:55:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c0b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2343 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2344 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c0b0 principal evaluation fails
[2345 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c0b0 gate 1578074128079882900 evaluation fails
[2346 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2347 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2348 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2349 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 b7 99 40 24 5f 45 8d cb f9 8f ba 59 34 26 7c |&..@$_E.....Y4&||
00000010 61 0a aa 89 f4 69 51 8e 15 80 b1 88 ed a2 38 8e |a....iQ.......8.|
[234a 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a c8 47 4a 0f 95 f3 91 85 a6 a5 23 |0D. Z.GJ.......#|
00000010 97 64 ab cd c4 50 f2 fd 4d 78 0a 17 e0 58 fe 57 |.d...P..Mx...X.W|
00000020 4b a6 7d 6d 02 20 7a a0 ae f7 f9 8f 62 4e de 3b |K.}m. z.....bN.;|
00000030 5e 68 a3 a4 f4 71 83 07 ce 85 9a 32 35 f6 dd 58 |^h...q.....25..X|
00000040 2d 4b 4a 02 cd 3a |-KJ..:|
[234b 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[234c 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c9b0 gate 1578074128080446900 evaluation starts
[234d 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c9b0 signed by 0 principal evaluation starts (used [false])
[234e 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c9b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[234f 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c9b0 principal evaluation succeeds for identity 0
[2350 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c9b0 gate 1578074128080446900 evaluation succeeds
[2351 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2352 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2353 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2354 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2355 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2356 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes]}
[2357 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37
[2358 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37
[2359 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[235a 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[235b 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[235c 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[235d 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[235e 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[235f 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2360 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2361 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2362 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2363 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2364 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2365 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2366 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2367 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2368 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2369 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[236a 01-03 17:55:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[236b 01-03 17:55:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[236c 01-03 17:55:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[236d 01-03 17:55:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[236e 01-03 17:55:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[236f 01-03 17:55:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151022
[2370 01-03 17:55:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7228F062DE62234DA29D204F6D9797875BC7D0E72AB996A11F8D31E3A19E9004
[2371 01-03 17:55:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2372 01-03 17:55:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2373 01-03 17:55:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2374 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2375 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2376 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2377 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2378 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes
[2379 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[237a 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[237b 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[237c 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes
[237d 01-03 17:55:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[237e 01-03 17:55:28.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[237f 01-03 17:55:28.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2380 01-03 17:55:28.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2381 01-03 17:55:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:3363647255057832565 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2382 01-03 17:55:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:3363647255057832565 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2383 01-03 17:55:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3363647255057832565 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2384 01-03 17:55:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2385 01-03 17:55:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2386 01-03 17:55:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2387 01-03 17:55:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2388 01-03 17:55:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2389 01-03 17:55:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[238a 01-03 17:55:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[238b 01-03 17:55:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[238c 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:16765331946391256222 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[238d 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:16765331946391256222 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[238e 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16765331946391256222 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[238f 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2390 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2391 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2392 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2393 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2394 01-03 17:55:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2395 01-03 17:55:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[2396 01-03 17:55:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2397 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2398 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2399 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[239a 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[239b 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[239c 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[239d 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[239e 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[239f 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[23a0 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[23a1 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[23a2 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[23a3 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 8e 34 f4 2d f0 31 8c 90 e9 ba 37 a6 b3 91 2c |K.4.-.1....7...,|
00000010 16 ca 08 e7 c5 fd d8 03 e7 9a b4 e9 9d 76 e1 d3 |.............v..|
[23a4 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 0b 3d f8 87 e1 0d 17 05 ed 46 |0E.!...=.......F|
00000010 d4 6e f2 b5 03 4d 0c f7 d2 ff e1 c6 cc 2a ea 5e |.n...M.......*.^|
00000020 e0 7c c1 dd f0 02 20 49 1d 21 b4 23 e1 9f 19 c3 |.|.... I.!.#....|
00000030 31 a6 8b 25 bd 32 b5 08 ba e4 4e 04 ec a4 6b fb |1..%.2....N...k.|
00000040 24 fe 8c 8f 62 85 00 |$...b..|
[23a5 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[23a6 01-03 17:55:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728070 gate 1578074129089406100 evaluation starts
[23a7 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728070 signed by 0 principal evaluation starts (used [false])
[23a8 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728070 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[23a9 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[23aa 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728070 principal evaluation fails
[23ab 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728070 gate 1578074129089406100 evaluation fails
[23ac 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[23ad 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[23ae 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[23af 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 8e 34 f4 2d f0 31 8c 90 e9 ba 37 a6 b3 91 2c |K.4.-.1....7...,|
00000010 16 ca 08 e7 c5 fd d8 03 e7 9a b4 e9 9d 76 e1 d3 |.............v..|
[23b0 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 0b 3d f8 87 e1 0d 17 05 ed 46 |0E.!...=.......F|
00000010 d4 6e f2 b5 03 4d 0c f7 d2 ff e1 c6 cc 2a ea 5e |.n...M.......*.^|
00000020 e0 7c c1 dd f0 02 20 49 1d 21 b4 23 e1 9f 19 c3 |.|.... I.!.#....|
00000030 31 a6 8b 25 bd 32 b5 08 ba e4 4e 04 ec a4 6b fb |1..%.2....N...k.|
00000040 24 fe 8c 8f 62 85 00 |$...b..|
[23b1 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[23b2 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728970 gate 1578074129098483600 evaluation starts
[23b3 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728970 signed by 0 principal evaluation starts (used [false])
[23b4 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728970 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[23b5 01-03 17:55:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728970 principal evaluation succeeds for identity 0
[23b6 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728970 gate 1578074129098483600 evaluation succeeds
[23b7 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[23b8 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[23b9 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[23ba 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[23bb 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[23bc 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}
[23bd 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38
[23be 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38
[23bf 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[23c0 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23c1 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23c2 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23c3 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[23c4 01-03 17:55:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23c5 01-03 17:55:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23c6 01-03 17:55:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23c7 01-03 17:55:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[23c8 01-03 17:55:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[23c9 01-03 17:55:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[23ca 01-03 17:55:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23cb 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[23cc 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[23cd 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23ce 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[23cf 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[23d0 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23d1 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[23d2 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[23d3 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[23d4 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[23d5 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[23d6 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[23d7 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 33 7f bc 0a 39 88 e7 2c b9 66 0f 6e 2a 98 2e |.3...9..,.f.n*..|
00000010 c9 3c b4 ce c5 10 bd 2e c3 e8 6b 06 5f d7 53 bc |.<........k._.S.|
[23d8 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 74 e4 6d cc f4 ff 91 49 37 97 |0E.!..t.m....I7.|
00000010 8c 66 8b 09 74 5b 7a 27 6e 68 a3 ad 9f a2 1d 27 |.f..t[z'nh.....'|
00000020 a1 a0 f3 0f 0c 02 20 62 d4 3b 95 32 c3 20 3f b8 |...... b.;.2. ?.|
00000030 74 48 80 84 03 f3 89 ad ac 89 37 1b dd dc 57 47 |tH........7...WG|
00000040 ea 78 d1 28 a6 18 69 |.x.(..i|
[23d9 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[23da 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f16d0 gate 1578074129134234000 evaluation starts
[23db 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f16d0 signed by 0 principal evaluation starts (used [false])
[23dc 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f16d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[23dd 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f16d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[23de 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f16d0 principal evaluation fails
[23df 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f16d0 gate 1578074129134234000 evaluation fails
[23e0 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[23e1 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[23e2 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[23e3 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 33 7f bc 0a 39 88 e7 2c b9 66 0f 6e 2a 98 2e |.3...9..,.f.n*..|
00000010 c9 3c b4 ce c5 10 bd 2e c3 e8 6b 06 5f d7 53 bc |.<........k._.S.|
[23e4 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 74 e4 6d cc f4 ff 91 49 37 97 |0E.!..t.m....I7.|
00000010 8c 66 8b 09 74 5b 7a 27 6e 68 a3 ad 9f a2 1d 27 |.f..t[z'nh.....'|
00000020 a1 a0 f3 0f 0c 02 20 62 d4 3b 95 32 c3 20 3f b8 |...... b.;.2. ?.|
00000030 74 48 80 84 03 f3 89 ad ac 89 37 1b dd dc 57 47 |tH........7...WG|
00000040 ea 78 d1 28 a6 18 69 |.x.(..i|
[23e5 01-03 17:55:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[23e6 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1fd0 gate 1578074129140010000 evaluation starts
[23e7 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1fd0 signed by 0 principal evaluation starts (used [false])
[23e8 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1fd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[23e9 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1fd0 principal evaluation succeeds for identity 0
[23ea 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f1fd0 gate 1578074129140010000 evaluation succeeds
[23eb 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[23ec 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[23ed 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[23ee 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[23ef 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[23f0 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}
[23f1 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36
[23f2 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36
[23f3 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[23f4 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23f5 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23f6 01-03 17:55:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[23f7 01-03 17:55:29.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23f8 01-03 17:55:29.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23f9 01-03 17:55:29.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23fa 01-03 17:55:29.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[23fb 01-03 17:55:29.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[23fc 01-03 17:55:29.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[23fd 01-03 17:55:29.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23fe 01-03 17:55:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23ff 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2400 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11421387987480086482 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2401 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[2402 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13040828555549768008 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2403 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[2404 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5229486803649237269 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2405 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5229486803649237269 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2406 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2407 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11421387987480086482 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2408 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2409 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13040828555549768008 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[240a 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[240b 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5229486803649237269 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[240c 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5229486803649237269 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[240d 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5229486803649237269 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[240e 01-03 17:55:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[240f 01-03 17:55:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13040828555549768008 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[2410 01-03 17:55:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13040828555549768008 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[2411 01-03 17:55:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13040828555549768008 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[2412 01-03 17:55:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2413 01-03 17:55:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11421387987480086482 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[2414 01-03 17:55:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11421387987480086482 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[2415 01-03 17:55:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2416 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151023
[2417 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6346CF61A7CFF6FE10535E5DE4CB19ABC64FDAB99948B5C34A9254FF0B1DDAA2
[2418 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2419 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[241a 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[241b 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[241c 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[241d 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[241e 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[241f 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2420 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2421 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2422 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2423 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[2424 01-03 17:55:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2425 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2426 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2427 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2428 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2429 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[242a 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[242b 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[242c 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[242d 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[242e 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[242f 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2430 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2431 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 33 7f bc 0a 39 88 e7 2c b9 66 0f 6e 2a 98 2e |.3...9..,.f.n*..|
00000010 c9 3c b4 ce c5 10 bd 2e c3 e8 6b 06 5f d7 53 bc |.<........k._.S.|
[2432 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 74 e4 6d cc f4 ff 91 49 37 97 |0E.!..t.m....I7.|
00000010 8c 66 8b 09 74 5b 7a 27 6e 68 a3 ad 9f a2 1d 27 |.f..t[z'nh.....'|
00000020 a1 a0 f3 0f 0c 02 20 62 d4 3b 95 32 c3 20 3f b8 |...... b.;.2. ?.|
00000030 74 48 80 84 03 f3 89 ad ac 89 37 1b dd dc 57 47 |tH........7...WG|
00000040 ea 78 d1 28 a6 18 69 |.x.(..i|
[2433 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2434 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a980f0 gate 1578074129315179600 evaluation starts
[2435 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a980f0 signed by 0 principal evaluation starts (used [false])
[2436 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a980f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2437 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a980f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2438 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a980f0 principal evaluation fails
[2439 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a980f0 gate 1578074129315179600 evaluation fails
[243a 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[243b 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[243c 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[243d 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 33 7f bc 0a 39 88 e7 2c b9 66 0f 6e 2a 98 2e |.3...9..,.f.n*..|
00000010 c9 3c b4 ce c5 10 bd 2e c3 e8 6b 06 5f d7 53 bc |.<........k._.S.|
[243e 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 74 e4 6d cc f4 ff 91 49 37 97 |0E.!..t.m....I7.|
00000010 8c 66 8b 09 74 5b 7a 27 6e 68 a3 ad 9f a2 1d 27 |.f..t[z'nh.....'|
00000020 a1 a0 f3 0f 0c 02 20 62 d4 3b 95 32 c3 20 3f b8 |...... b.;.2. ?.|
00000030 74 48 80 84 03 f3 89 ad ac 89 37 1b dd dc 57 47 |tH........7...WG|
00000040 ea 78 d1 28 a6 18 69 |.x.(..i|
[243f 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2440 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a989f0 gate 1578074129315605400 evaluation starts
[2441 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a989f0 signed by 0 principal evaluation starts (used [false])
[2442 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a989f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2443 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a989f0 principal evaluation succeeds for identity 0
[2444 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a989f0 gate 1578074129315605400 evaluation succeeds
[2445 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2446 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2447 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2448 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2449 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[244a 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[244b 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[244c 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 46 cf 61 a7 cf f6 fe 10 53 5e 5d e4 cb 19 ab |cF.a.....S^]....|
00000010 c6 4f da b9 99 48 b5 c3 4a 92 54 ff 0b 1d da a2 |.O...H..J.T.....|
[244d 01-03 17:55:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 a8 ff 06 34 42 2b eb 45 2e 4f 79 |0D. ....4B+.E.Oy|
00000010 21 c9 74 26 ed 0e dd 25 44 94 04 a7 87 44 eb 5c |!.t&...%D....D.\|
00000020 e8 c9 0e 6e 02 20 58 28 dd f0 f1 c4 88 58 d5 0b |...n. X(.....X..|
00000030 31 c6 ae 5e 06 db 72 0f 93 0e 3e e0 77 da 07 d2 |1..^..r...>.w...|
00000040 82 74 e2 c2 c7 04 |.t....|
[244e 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[244f 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2450 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2451 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2452 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 41 14 05 ff 8c 9b 33 00 c7 98 57 e8 3b 16 0a |.A.....3...W.;..|
00000010 b5 74 e8 c6 6e d4 0b a7 81 fb 36 40 f9 ad d1 74 |.t..n.....6@...t|
[2453 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 48 b7 a7 6b 49 51 16 35 c6 d8 |0E.!..H..kIQ.5..|
00000010 87 d6 a8 7d 0f 2a 99 37 da 04 1f 4d 83 30 a9 a1 |...}.*.7...M.0..|
00000020 1a 2e 24 db 67 02 20 3c 92 e0 55 45 22 7d 0a 53 |..$.g. <..UE"}.S|
00000030 24 ee 6a 52 da c8 0e 5c cb 60 57 b5 4f 01 59 f9 |$.jR...\.`W.O.Y.|
00000040 a6 23 39 24 65 f5 9b |.#9$e..|
[2454 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[2455 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2456 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2457 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2458 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2459 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[245a 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[245b 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[245c 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 46 cf 61 a7 cf f6 fe 10 53 5e 5d e4 cb 19 ab |cF.a.....S^]....|
00000010 c6 4f da b9 99 48 b5 c3 4a 92 54 ff 0b 1d da a2 |.O...H..J.T.....|
[245d 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 a8 ff 06 34 42 2b eb 45 2e 4f 79 |0D. ....4B+.E.Oy|
00000010 21 c9 74 26 ed 0e dd 25 44 94 04 a7 87 44 eb 5c |!.t&...%D....D.\|
00000020 e8 c9 0e 6e 02 20 58 28 dd f0 f1 c4 88 58 d5 0b |...n. X(.....X..|
00000030 31 c6 ae 5e 06 db 72 0f 93 0e 3e e0 77 da 07 d2 |1..^..r...>.w...|
00000040 82 74 e2 c2 c7 04 |.t....|
[245e 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[245f 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2460 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2461 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2462 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2463 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2464 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2465 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2466 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2467 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2468 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2469 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 8e 34 f4 2d f0 31 8c 90 e9 ba 37 a6 b3 91 2c |K.4.-.1....7...,|
00000010 16 ca 08 e7 c5 fd d8 03 e7 9a b4 e9 9d 76 e1 d3 |.............v..|
[246a 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 0b 3d f8 87 e1 0d 17 05 ed 46 |0E.!...=.......F|
00000010 d4 6e f2 b5 03 4d 0c f7 d2 ff e1 c6 cc 2a ea 5e |.n...M.......*.^|
00000020 e0 7c c1 dd f0 02 20 49 1d 21 b4 23 e1 9f 19 c3 |.|.... I.!.#....|
00000030 31 a6 8b 25 bd 32 b5 08 ba e4 4e 04 ec a4 6b fb |1..%.2....N...k.|
00000040 24 fe 8c 8f 62 85 00 |$...b..|
[246b 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[246c 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eeea30 gate 1578074129327530100 evaluation starts
[246d 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eeea30 signed by 0 principal evaluation starts (used [false])
[246e 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eeea30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[246f 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eeea30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2470 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eeea30 principal evaluation fails
[2471 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eeea30 gate 1578074129327530100 evaluation fails
[2472 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2473 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2474 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2475 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 8e 34 f4 2d f0 31 8c 90 e9 ba 37 a6 b3 91 2c |K.4.-.1....7...,|
00000010 16 ca 08 e7 c5 fd d8 03 e7 9a b4 e9 9d 76 e1 d3 |.............v..|
[2476 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 0b 3d f8 87 e1 0d 17 05 ed 46 |0E.!...=.......F|
00000010 d4 6e f2 b5 03 4d 0c f7 d2 ff e1 c6 cc 2a ea 5e |.n...M.......*.^|
00000020 e0 7c c1 dd f0 02 20 49 1d 21 b4 23 e1 9f 19 c3 |.|.... I.!.#....|
00000030 31 a6 8b 25 bd 32 b5 08 ba e4 4e 04 ec a4 6b fb |1..%.2....N...k.|
00000040 24 fe 8c 8f 62 85 00 |$...b..|
[2477 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2478 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eef330 gate 1578074129328672800 evaluation starts
[2479 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eef330 signed by 0 principal evaluation starts (used [false])
[247a 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eef330 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[247b 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eef330 principal evaluation succeeds for identity 0
[247c 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eef330 gate 1578074129328672800 evaluation succeeds
[247d 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[247e 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[247f 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2480 01-03 17:55:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2481 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[2482 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2483 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2484 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 41 14 05 ff 8c 9b 33 00 c7 98 57 e8 3b 16 0a |.A.....3...W.;..|
00000010 b5 74 e8 c6 6e d4 0b a7 81 fb 36 40 f9 ad d1 74 |.t..n.....6@...t|
[2485 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 48 b7 a7 6b 49 51 16 35 c6 d8 |0E.!..H..kIQ.5..|
00000010 87 d6 a8 7d 0f 2a 99 37 da 04 1f 4d 83 30 a9 a1 |...}.*.7...M.0..|
00000020 1a 2e 24 db 67 02 20 3c 92 e0 55 45 22 7d 0a 53 |..$.g. <..UE"}.S|
00000030 24 ee 6a 52 da c8 0e 5c cb 60 57 b5 4f 01 59 f9 |$.jR...\.`W.O.Y.|
00000040 a6 23 39 24 65 f5 9b |.#9$e..|
[2486 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[2487 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2488 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2489 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[248a 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[248b 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[248c 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[248d 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 46 cf 61 a7 cf f6 fe 10 53 5e 5d e4 cb 19 ab |cF.a.....S^]....|
00000010 c6 4f da b9 99 48 b5 c3 4a 92 54 ff 0b 1d da a2 |.O...H..J.T.....|
[248e 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 a8 ff 06 34 42 2b eb 45 2e 4f 79 |0D. ....4B+.E.Oy|
00000010 21 c9 74 26 ed 0e dd 25 44 94 04 a7 87 44 eb 5c |!.t&...%D....D.\|
00000020 e8 c9 0e 6e 02 20 58 28 dd f0 f1 c4 88 58 d5 0b |...n. X(.....X..|
00000030 31 c6 ae 5e 06 db 72 0f 93 0e 3e e0 77 da 07 d2 |1..^..r...>.w...|
00000040 82 74 e2 c2 c7 04 |.t....|
[248f 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2490 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 54 36 9c 7e 2f 01 13 92 95 43 4e |0D. T6.~/....CN|
00000010 16 4b 5c 7e 37 4c 9d e8 ab 48 70 e9 26 b5 2c c4 |.K\~7L...Hp.&.,.|
00000020 22 98 01 82 02 20 78 ee 75 81 f8 68 45 07 31 42 |".... x.u..hE.1B|
00000030 eb 18 d6 a9 55 32 33 1b a4 00 ca 0f eb 7b 6a 5b |....U23......{j[|
00000040 92 4d 28 80 51 97 |.M(.Q.|
[2491 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2492 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2493 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2494 01-03 17:55:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2495 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2496 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2497 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[2498 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2499 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[249a 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[249b 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[249c 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[249d 01-03 17:55:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[249e 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[249f 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[24a0 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[24a1 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[24a2 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[24a3 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[24a4 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24a5 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24a6 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[24a7 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[24a8 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[24a9 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[24aa 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[24ab 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[24ac 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[24ad 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[24ae 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[24af 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f323c0 gate 1578074129483746700 evaluation starts
[24b0 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f323c0 signed by 0 principal evaluation starts (used [false])
[24b1 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f323c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[24b2 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f323c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[24b3 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f323c0 principal evaluation fails
[24b4 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f323c0 gate 1578074129483746700 evaluation fails
[24b5 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[24b6 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[24b7 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[24b8 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[24b9 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[24ba 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[24bb 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32cc0 gate 1578074129486050000 evaluation starts
[24bc 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32cc0 signed by 0 principal evaluation starts (used [false])
[24bd 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32cc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[24be 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[24bf 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32cc0 principal evaluation succeeds for identity 0
[24c0 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32cc0 gate 1578074129486050000 evaluation succeeds
[24c1 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[24c2 01-03 17:55:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[24c3 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[24c4 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[24c5 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24c6 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24c7 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[24c8 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[24c9 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[24ca 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[24cb 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[24cc 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[24cd 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[24ce 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[24cf 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[24d0 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c720 gate 1578074129492686400 evaluation starts
[24d1 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c720 signed by 0 principal evaluation starts (used [false])
[24d2 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c720 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[24d3 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[24d4 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c720 principal evaluation fails
[24d5 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c720 gate 1578074129492686400 evaluation fails
[24d6 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[24d7 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[24d8 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[24d9 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[24da 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[24db 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[24dc 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d020 gate 1578074129493436500 evaluation starts
[24dd 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d020 signed by 0 principal evaluation starts (used [false])
[24de 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d020 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[24df 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d020 principal evaluation succeeds for identity 0
[24e0 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d020 gate 1578074129493436500 evaluation succeeds
[24e1 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[24e2 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[24e3 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[24e4 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[24e5 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24e6 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[24e7 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24e8 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24e9 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24ea 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[24eb 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[24ec 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[24ed 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[24ee 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[24ef 01-03 17:55:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[24f0 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[24f1 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[24f2 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[24f3 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f66d30 gate 1578074129500345800 evaluation starts
[24f4 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f66d30 signed by 0 principal evaluation starts (used [false])
[24f5 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f66d30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[24f6 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f66d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[24f7 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f66d30 principal evaluation fails
[24f8 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f66d30 gate 1578074129500345800 evaluation fails
[24f9 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[24fa 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[24fb 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[24fc 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[24fd 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[24fe 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[24ff 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67630 gate 1578074129502357000 evaluation starts
[2500 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67630 signed by 0 principal evaluation starts (used [false])
[2501 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67630 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2502 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67630 principal evaluation succeeds for identity 0
[2503 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f67630 gate 1578074129502357000 evaluation succeeds
[2504 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2505 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2506 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2507 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2508 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2509 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[250a 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[250b 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[250c 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[250d 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[250e 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[250f 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2510 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2511 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2512 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2513 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2514 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2515 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2516 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2517 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f75df0 gate 1578074129505319600 evaluation starts
[2518 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f75df0 signed by 0 principal evaluation starts (used [false])
[2519 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f75df0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[251a 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f75df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[251b 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f75df0 principal evaluation fails
[251c 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f75df0 gate 1578074129505319600 evaluation fails
[251d 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[251e 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[251f 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2520 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2521 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2522 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2523 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8e6f0 gate 1578074129506133500 evaluation starts
[2524 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8e6f0 signed by 0 principal evaluation starts (used [false])
[2525 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8e6f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2526 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8e6f0 principal evaluation succeeds for identity 0
[2527 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8e6f0 gate 1578074129506133500 evaluation succeeds
[2528 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2529 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[252a 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[252b 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[252c 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[252d 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[252e 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[252f 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2530 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2531 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2532 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2533 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2534 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2535 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2536 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2537 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2538 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2539 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[253a 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6400 gate 1578074129509383500 evaluation starts
[253b 01-03 17:55:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6400 signed by 0 principal evaluation starts (used [false])
[253c 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6400 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[253d 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[253e 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6400 principal evaluation fails
[253f 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6400 gate 1578074129509383500 evaluation fails
[2540 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2541 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2542 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2543 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2544 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2545 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2546 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6d00 gate 1578074129516797500 evaluation starts
[2547 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6d00 signed by 0 principal evaluation starts (used [false])
[2548 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6d00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2549 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6d00 principal evaluation succeeds for identity 0
[254a 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6d00 gate 1578074129516797500 evaluation succeeds
[254b 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[254c 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[254d 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[254e 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[254f 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2550 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2551 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2552 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2553 01-03 17:55:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2554 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2555 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2556 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2557 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2558 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2559 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[255a 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[255b 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[255c 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc0e10 gate 1578074129521662100 evaluation starts
[255d 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc0e10 signed by 0 principal evaluation starts (used [false])
[255e 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc0e10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[255f 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc0e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2560 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc0e10 principal evaluation fails
[2561 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc0e10 gate 1578074129521662100 evaluation fails
[2562 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2563 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2564 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2565 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2566 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2567 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2568 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc1710 gate 1578074129524405000 evaluation starts
[2569 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc1710 signed by 0 principal evaluation starts (used [false])
[256a 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc1710 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[256b 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc1710 principal evaluation succeeds for identity 0
[256c 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc1710 gate 1578074129524405000 evaluation succeeds
[256d 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[256e 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[256f 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2570 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2571 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2572 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2573 01-03 17:55:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2574 01-03 17:55:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2575 01-03 17:55:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2576 01-03 17:55:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[2577 01-03 17:55:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2578 01-03 17:55:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2579 01-03 17:55:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8235544174098668080 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[257a 01-03 17:55:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8235544174098668080 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[257b 01-03 17:55:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[257c 01-03 17:55:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8235544174098668080 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[257d 01-03 17:55:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8235544174098668080 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[257e 01-03 17:55:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[257f 01-03 17:55:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[2580 01-03 17:55:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2581 01-03 17:55:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2582 01-03 17:55:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2583 01-03 17:55:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8474890998463955194 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2584 01-03 17:55:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8474890998463955194 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2585 01-03 17:55:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2586 01-03 17:55:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2587 01-03 17:55:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2588 01-03 17:55:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2589 01-03 17:55:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[258a 01-03 17:55:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[258b 01-03 17:55:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[258c 01-03 17:55:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[258d 01-03 17:55:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[258e 01-03 17:55:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[258f 01-03 17:55:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2590 01-03 17:55:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2591 01-03 17:55:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2592 01-03 17:55:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2593 01-03 17:55:31.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[2594 01-03 17:55:31.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[2595 01-03 17:55:31.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315100A1801
[2596 01-03 17:55:31.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5D91D35FB31BF78465E07973DC871300C278AD4DA697D9C7D7A9DAEF2200E9E9
[2597 01-03 17:55:31.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[2598 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2599 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[259a 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[259b 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[259c 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[259d 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[259e 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[25a0 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[259f 01-03 17:55:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25a1 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[25a2 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25a3 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[25a4 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[25a5 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d d6 a6 cc ad ce 4a c5 54 bd 4a 3f da 92 db b0 |......J.T.J?....|
00000010 e4 12 02 32 13 5e 95 02 16 d3 7a 4e aa eb 0a 2e |...2.^....zN....|
[25a6 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df fc 99 61 69 fe dd 2b 7c 0b d3 |0E.!....ai..+|..|
00000010 1a 8e f2 43 da 28 52 cd 2a d9 6f ff 86 5d 4a c9 |...C.(R.*.o..]J.|
00000020 ec 6c dd 9b 57 02 20 49 3c 07 10 88 16 1c c2 4c |.l..W. I<......L|
00000030 ca 6e bc 72 b2 73 fc 0b 39 67 34 30 c1 24 d5 4f |.n.r.s..9g40.$.O|
00000040 c3 e4 14 e9 17 fd 66 |......f|
[25a7 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[25a8 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 ea 17 33 c8 1c db 9c 7f 0b a5 |0E.!....3.......|
00000010 1c 70 1d ff 5a 70 4e 05 32 f6 bf f8 ac 6c 8c 74 |.p..ZpN.2....l.t|
00000020 cc 7b 1c d0 be 02 20 4f bf da 98 0b b3 f0 1a 45 |.{.... O.......E|
00000030 83 3d 5b 68 66 04 a3 f6 3b ad b9 d1 50 c7 4f 66 |.=[hf...;...P.Of|
00000040 8e 1f 13 1a 8d 58 c8 |.....X.|
[25a9 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[25aa 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[25ab 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39
[25ac 01-03 17:55:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39
[25ad 01-03 17:55:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[25ae 01-03 17:55:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25af 01-03 17:55:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25b0 01-03 17:55:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25b1 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[25b2 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[25b3 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25b4 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[25b5 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25b6 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25b7 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25b8 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25b9 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[25ba 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25bb 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[25bc 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[25bd 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25be 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[25bf 01-03 17:55:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25c0 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:14223067993144301133 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[25c1 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14223067993144301133 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[25c2 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[25c3 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25c4 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[25c5 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[25c6 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25c7 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[25c8 01-03 17:55:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25c9 01-03 17:55:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[25ca 01-03 17:55:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25cb 01-03 17:55:31.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[25cc 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[25cd 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 61 12 ec c3 bc 62 49 61 9c 0e de b5 47 6d 11 |1a....bIa....Gm.|
00000010 44 8c cf 30 d1 75 65 bc 14 f8 91 9f 8e f4 27 dd |D..0.ue.......'.|
[25ce 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a 7e 47 ad ab f1 cb ad 9e e4 ee |0E.!..~G........|
00000010 21 d6 9b d9 2d d4 eb 91 d7 95 93 97 5c 8d ca d9 |!...-.......\...|
00000020 6c 97 f0 5f 41 02 20 04 21 c5 ae f4 87 7d 4f c3 |l.._A. .!....}O.|
00000030 ac f3 d3 0c fa 27 89 b8 0c 26 6e 89 ac 67 26 69 |.....'...&n..g&i|
00000040 d1 34 1b 65 dc 60 97 |.4.e.`.|
[25cf 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[25d0 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 b9 ba 3c 94 42 a1 19 03 a5 a8 |0E.!....<.B.....|
00000010 55 7d 83 24 8c ed cb 9d f2 b7 17 34 ba fa 57 ce |U}.$.......4..W.|
00000020 54 8b 6d 64 d5 02 20 24 4f ac c9 2e 21 0a f7 a2 |T.md.. $O...!...|
00000030 4a cb 1f 5c 49 66 97 a1 19 40 e5 b4 f1 e6 4b 55 |J..\If...@....KU|
00000040 a8 7b 31 2f e7 a1 13 |.{1/...|
[25d1 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[25d2 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[25d3 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40
[25d4 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40
[25d5 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[25d6 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25d7 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25d8 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25d9 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[25da 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25db 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25dc 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[25dd 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[25de 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[25df 01-03 17:55:31.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25e0 01-03 17:55:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[25e1 01-03 17:55:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[25e2 01-03 17:55:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25e3 01-03 17:55:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[25e4 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[25e5 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25e6 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[25e7 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[25e8 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[25e9 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[25ea 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[25eb 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[25ec 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d a0 40 d0 42 e1 1d 8f dd 1b 7e 1b 9b 65 60 02 |=.@.B.....~..e`.|
00000010 8e 3e c3 5e 83 aa 7f be da be de 7d e1 51 78 88 |.>.^.......}.Qx.|
[25ed 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d b2 cc 2b 76 29 3c 5c f6 0e 54 27 |0D. }..+v)<\..T'|
00000010 83 0c 33 2e b5 99 8c 7c 48 de 86 b0 a2 9f 76 56 |..3....|H.....vV|
00000020 7f e5 5e f6 02 20 18 f3 42 1b 6b 92 f3 df 19 be |..^.. ..B.k.....|
00000030 22 f9 c9 16 76 64 d1 25 8d 64 2b 49 44 ae 3f 81 |"...vd.%.d+ID.?.|
00000040 25 41 69 42 97 c2 |%AiB..|
[25ee 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[25ef 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071950 gate 1578074133024396100 evaluation starts
[25f0 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071950 signed by 0 principal evaluation starts (used [false])
[25f1 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071950 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[25f2 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[25f3 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071950 principal evaluation fails
[25f4 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071950 gate 1578074133024396100 evaluation fails
[25f5 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[25f6 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[25f7 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[25f8 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d a0 40 d0 42 e1 1d 8f dd 1b 7e 1b 9b 65 60 02 |=.@.B.....~..e`.|
00000010 8e 3e c3 5e 83 aa 7f be da be de 7d e1 51 78 88 |.>.^.......}.Qx.|
[25f9 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d b2 cc 2b 76 29 3c 5c f6 0e 54 27 |0D. }..+v)<\..T'|
00000010 83 0c 33 2e b5 99 8c 7c 48 de 86 b0 a2 9f 76 56 |..3....|H.....vV|
00000020 7f e5 5e f6 02 20 18 f3 42 1b 6b 92 f3 df 19 be |..^.. ..B.k.....|
00000030 22 f9 c9 16 76 64 d1 25 8d 64 2b 49 44 ae 3f 81 |"...vd.%.d+ID.?.|
00000040 25 41 69 42 97 c2 |%AiB..|
[25fa 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[25fb 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307e250 gate 1578074133025010500 evaluation starts
[25fc 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307e250 signed by 0 principal evaluation starts (used [false])
[25fd 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307e250 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[25fe 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307e250 principal evaluation succeeds for identity 0
[25ff 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00307e250 gate 1578074133025010500 evaluation succeeds
[2600 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2601 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2602 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2603 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2604 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2605 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes]}
[2606 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37
[2607 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37
[2608 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2609 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[260a 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[260b 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[260c 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[260d 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[260e 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[260f 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2610 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2611 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2612 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2613 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2614 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2615 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2616 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2617 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2618 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2619 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[261a 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[261b 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[261c 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[261d 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[261e 01-03 17:55:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[261f 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2620 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2621 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2622 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2623 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:18290248311814458387 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2624 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:18290248311814458387 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2625 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:18290248311814458387 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2626 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2627 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2628 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2629 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[262a 01-03 17:55:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[262b 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:3773819781007628808 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[262c 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[262d 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[262e 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[262f 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:3773819781007628808 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2630 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3773819781007628808 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2631 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2632 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2633 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2634 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2635 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2636 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2637 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[2638 01-03 17:55:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2639 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[263a 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[263b 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[263c 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[263d 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[263e 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[263f 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2640 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2641 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2642 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2643 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2644 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 23 c7 4c e3 bc 25 4f 71 ee ca 3a c1 dc cf fa |L#.L..%Oq..:....|
00000010 9d 07 42 db 8e 0c a0 66 63 35 50 89 19 a5 cc 99 |..B....fc5P.....|
[2645 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 41 eb a6 ee 74 5b c3 4d 2f 64 |0E.!..A...t[.M/d|
00000010 57 41 6f b0 d7 84 10 9f 4f 81 49 df 3e 74 c9 8e |WAo.....O.I.>t..|
00000020 0d a2 4b 15 36 02 20 18 b3 ae ce 68 3a 81 00 70 |..K.6. ....h:..p|
00000030 72 4f c3 39 46 ca ca d7 b0 67 72 5c d6 91 29 df |rO.9F....gr\..).|
00000040 45 b7 25 ff ba 47 85 |E.%..G.|
[2646 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2647 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d72d0 gate 1578074133088101600 evaluation starts
[2648 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d72d0 signed by 0 principal evaluation starts (used [false])
[2649 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d72d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[264a 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d72d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[264b 01-03 17:55:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d72d0 principal evaluation fails
[264c 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d72d0 gate 1578074133088101600 evaluation fails
[264d 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[264e 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[264f 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2650 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 23 c7 4c e3 bc 25 4f 71 ee ca 3a c1 dc cf fa |L#.L..%Oq..:....|
00000010 9d 07 42 db 8e 0c a0 66 63 35 50 89 19 a5 cc 99 |..B....fc5P.....|
[2651 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 41 eb a6 ee 74 5b c3 4d 2f 64 |0E.!..A...t[.M/d|
00000010 57 41 6f b0 d7 84 10 9f 4f 81 49 df 3e 74 c9 8e |WAo.....O.I.>t..|
00000020 0d a2 4b 15 36 02 20 18 b3 ae ce 68 3a 81 00 70 |..K.6. ....h:..p|
00000030 72 4f c3 39 46 ca ca d7 b0 67 72 5c d6 91 29 df |rO.9F....gr\..).|
00000040 45 b7 25 ff ba 47 85 |E.%..G.|
[2652 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2653 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7bd0 gate 1578074133093898000 evaluation starts
[2654 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7bd0 signed by 0 principal evaluation starts (used [false])
[2655 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7bd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2656 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7bd0 principal evaluation succeeds for identity 0
[2657 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7bd0 gate 1578074133093898000 evaluation succeeds
[2658 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2659 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[265a 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[265b 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[265c 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[265d 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes]}
[265e 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39
[265f 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39
[2660 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2661 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2662 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2663 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2664 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2665 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2667 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2668 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2669 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[266a 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[266b 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[266c 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2666 01-03 17:55:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[266d 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[266e 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[266f 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2670 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[2671 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2673 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2674 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[2675 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2672 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[2676 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2677 01-03 17:55:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2678 01-03 17:55:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2679 01-03 17:55:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[267a 01-03 17:55:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[267b 01-03 17:55:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[267c 01-03 17:55:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[267d 01-03 17:55:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[267e 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[267f 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2680 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2681 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2682 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2683 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2684 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d e0 c5 24 a3 cc 89 0b 07 6f c7 73 2e ea 5e e8 |=..$.....o.s..^.|
00000010 33 a3 6b cf 2b e6 30 17 dd d0 ee 54 03 a8 1c 92 |3.k.+.0....T....|
[2685 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 a0 2e e8 5b 18 44 80 5e e1 19 |0E.!.....[.D.^..|
00000010 89 d6 9a f9 6c 98 65 34 d5 03 70 22 54 4e 8b 32 |....l.e4..p"TN.2|
00000020 52 00 a1 60 75 02 20 3b 47 67 30 49 e8 40 93 b6 |R..`u. ;Gg0I.@..|
00000030 17 9f 72 27 94 1d 2d f5 82 c3 67 92 0f 6c c4 a5 |..r'..-...g..l..|
00000040 36 07 97 db 4d 84 fc |6...M..|
[2686 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2687 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dbb00 gate 1578074133126402600 evaluation starts
[2688 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dbb00 signed by 0 principal evaluation starts (used [false])
[2689 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dbb00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[268a 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dbb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[268b 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dbb00 principal evaluation fails
[268c 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dbb00 gate 1578074133126402600 evaluation fails
[268d 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[268e 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[268f 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2690 01-03 17:55:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d e0 c5 24 a3 cc 89 0b 07 6f c7 73 2e ea 5e e8 |=..$.....o.s..^.|
00000010 33 a3 6b cf 2b e6 30 17 dd d0 ee 54 03 a8 1c 92 |3.k.+.0....T....|
[2691 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 a0 2e e8 5b 18 44 80 5e e1 19 |0E.!.....[.D.^..|
00000010 89 d6 9a f9 6c 98 65 34 d5 03 70 22 54 4e 8b 32 |....l.e4..p"TN.2|
00000020 52 00 a1 60 75 02 20 3b 47 67 30 49 e8 40 93 b6 |R..`u. ;Gg0I.@..|
00000030 17 9f 72 27 94 1d 2d f5 82 c3 67 92 0f 6c c4 a5 |..r'..-...g..l..|
00000040 36 07 97 db 4d 84 fc |6...M..|
[2692 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2693 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a4400 gate 1578074133131452500 evaluation starts
[2694 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a4400 signed by 0 principal evaluation starts (used [false])
[2695 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a4400 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2696 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a4400 principal evaluation succeeds for identity 0
[2697 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2699 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2698 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a4400 gate 1578074133131452500 evaluation succeeds
[269a 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[269b 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[269c 01-03 17:55:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[269d 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[269e 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes
[269f 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes]}
[26a0 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40
[26a1 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40
[26a2 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[26a3 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26a4 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26a5 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26a6 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[26a8 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26a9 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26aa 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26ab 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[26ac 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[26ad 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[26ae 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26a7 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[26af 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[26b0 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26b1 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[26b2 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[26b3 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[26b4 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[26b5 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[26b6 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[26b7 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 2a f8 c4 f8 e9 31 d2 b3 3f c1 8e ec db 66 30 |d*....1..?....f0|
00000010 5e 73 74 3c 94 ab c8 f5 1b f6 4e e9 69 14 4f 99 |^st<......N.i.O.|
[26b8 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 32 97 a8 dc 95 c1 f9 14 a8 9d |0E.!..2.........|
00000010 ab bd d6 26 a8 46 8d f3 f2 d0 bb b6 6e 61 d7 d6 |...&.F......na..|
00000020 ed 8f 6c 5b 47 02 20 77 de 36 1c 1c 69 6b c2 0f |..l[G. w.6..ik..|
00000030 19 d9 91 3a ab 20 96 a1 35 50 5d 72 30 2c 4f 8e |...:. ..5P]r0,O.|
00000040 bd 5e 38 3f e8 f6 b2 |.^8?...|
[26b9 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[26ba 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e82e0 gate 1578074133149021100 evaluation starts
[26bb 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e82e0 signed by 0 principal evaluation starts (used [false])
[26bc 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e82e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[26bd 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e82e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[26be 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e82e0 principal evaluation fails
[26bf 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e82e0 gate 1578074133149021100 evaluation fails
[26c0 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26c1 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[26c2 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[26c3 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[26c4 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[26c5 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 2a f8 c4 f8 e9 31 d2 b3 3f c1 8e ec db 66 30 |d*....1..?....f0|
00000010 5e 73 74 3c 94 ab c8 f5 1b f6 4e e9 69 14 4f 99 |^st<......N.i.O.|
[26c6 01-03 17:55:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 32 97 a8 dc 95 c1 f9 14 a8 9d |0E.!..2.........|
00000010 ab bd d6 26 a8 46 8d f3 f2 d0 bb b6 6e 61 d7 d6 |...&.F......na..|
00000020 ed 8f 6c 5b 47 02 20 77 de 36 1c 1c 69 6b c2 0f |..l[G. w.6..ik..|
00000030 19 d9 91 3a ab 20 96 a1 35 50 5d 72 30 2c 4f 8e |...:. ..5P]r0,O.|
00000040 bd 5e 38 3f e8 f6 b2 |.^8?...|
[26c7 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[26c8 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8be0 gate 1578074133151035900 evaluation starts
[26c9 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8be0 signed by 0 principal evaluation starts (used [false])
[26ca 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8be0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[26cb 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8be0 principal evaluation succeeds for identity 0
[26cc 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8be0 gate 1578074133151035900 evaluation succeeds
[26cd 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[26ce 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[26cf 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[26d0 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[26d1 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[26d2 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}
[26d3 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38
[26d4 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38
[26d5 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[26d6 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26d7 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26d8 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26d9 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[26da 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26db 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26dc 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[26dd 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26de 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26df 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26e0 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[26e1 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[26e2 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[26e3 01-03 17:55:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26e4 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[26e5 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5147907996047288058 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[26e6 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[26e7 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5422183569937821079 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[26e8 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[26e9 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1991674773266762359 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[26ea 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1991674773266762359 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[26eb 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26ec 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5147907996047288058 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[26ed 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26ee 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5422183569937821079 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[26ef 01-03 17:55:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26f0 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1991674773266762359 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[26f1 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1991674773266762359 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[26f2 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1991674773266762359 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[26f3 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26f4 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5422183569937821079 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[26f5 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5422183569937821079 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[26f6 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5422183569937821079 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[26f7 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26f8 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5147907996047288058 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[26f9 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5147907996047288058 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[26fa 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26fb 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151024
[26fc 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 237CFF3C0DD11F3A6F2A89390B45A5155A17AC181104DBF554BD69FCD79C50B1
[26fd 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[26fe 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[26ff 01-03 17:55:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2700 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2701 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2702 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2703 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2704 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[2706 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2708 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2705 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes
[2709 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes
[270b 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[270a 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2707 01-03 17:55:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[270c 01-03 17:55:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[270d 01-03 17:55:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151025
[270e 01-03 17:55:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 73529EE30BCBC79F3DBDF4B0F2F9047AF123A80C0F6365006E2CB3599DE519AA
[270f 01-03 17:55:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2710 01-03 17:55:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2711 01-03 17:55:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2712 01-03 17:55:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[2713 01-03 17:55:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[2714 01-03 17:55:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2715 01-03 17:55:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2716 01-03 17:55:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2717 01-03 17:55:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[2718 01-03 17:55:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[271a 01-03 17:55:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2719 01-03 17:55:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[271b 01-03 17:55:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[271c 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[271d 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[271e 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[271f 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2720 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 52 9e e3 0b cb c7 9f 3d bd f4 b0 f2 f9 04 7a |sR......=......z|
00000010 f1 23 a8 0c 0f 63 65 00 6e 2c b3 59 9d e5 19 aa |.#...ce.n,.Y....|
[2721 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 4f f4 d0 cb b1 f4 54 0b 53 7e |0E.!..O.....T.S~|
00000010 68 ad bc 5f 44 6b 5b 89 8e 11 53 40 2c 5c 62 60 |h.._Dk[...S@,\b`|
00000020 7d 56 a6 dd 32 02 20 79 c7 f4 96 d5 96 13 a6 3b |}V..2. y.......;|
00000030 98 80 0e 5f f7 6d c3 37 d1 b7 a9 5d 24 78 3e 1d |..._.m.7...]$x>.|
00000040 d7 cf 1e ef fc 62 28 |.....b(|
[2722 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2723 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 5b c0 68 83 64 3e 55 52 4e e4 b5 |0D. %[.h.d>URN..|
00000010 e0 ce 38 82 4b 2c b6 dc ce e0 77 0c 4c c2 4b 7e |..8.K,....w.L.K~|
00000020 42 20 46 38 02 20 39 52 b6 a3 fa 54 41 2a ee f7 |B F8. 9R...TA*..|
00000030 ce 72 ce 9c d3 05 dc 5e a8 ee 67 06 ca d4 58 38 |.r.....^..g...X8|
00000040 1c 45 81 d0 43 7d |.E..C}|
[2724 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2725 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2726 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2727 01-03 17:55:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2728 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[2729 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[272a 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[272b 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[272c 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[272d 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[272e 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[272f 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2730 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2731 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2732 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2733 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2734 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 2a f8 c4 f8 e9 31 d2 b3 3f c1 8e ec db 66 30 |d*....1..?....f0|
00000010 5e 73 74 3c 94 ab c8 f5 1b f6 4e e9 69 14 4f 99 |^st<......N.i.O.|
[2735 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 32 97 a8 dc 95 c1 f9 14 a8 9d |0E.!..2.........|
00000010 ab bd d6 26 a8 46 8d f3 f2 d0 bb b6 6e 61 d7 d6 |...&.F......na..|
00000020 ed 8f 6c 5b 47 02 20 77 de 36 1c 1c 69 6b c2 0f |..l[G. w.6..ik..|
00000030 19 d9 91 3a ab 20 96 a1 35 50 5d 72 30 2c 4f 8e |...:. ..5P]r0,O.|
00000040 bd 5e 38 3f e8 f6 b2 |.^8?...|
[2736 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2737 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032737c0 gate 1578074133348043100 evaluation starts
[2738 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032737c0 signed by 0 principal evaluation starts (used [false])
[2739 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032737c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[273a 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032737c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[273b 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032737c0 principal evaluation fails
[273c 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032737c0 gate 1578074133348043100 evaluation fails
[273d 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[273e 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[273f 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2740 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 2a f8 c4 f8 e9 31 d2 b3 3f c1 8e ec db 66 30 |d*....1..?....f0|
00000010 5e 73 74 3c 94 ab c8 f5 1b f6 4e e9 69 14 4f 99 |^st<......N.i.O.|
[2741 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 32 97 a8 dc 95 c1 f9 14 a8 9d |0E.!..2.........|
00000010 ab bd d6 26 a8 46 8d f3 f2 d0 bb b6 6e 61 d7 d6 |...&.F......na..|
00000020 ed 8f 6c 5b 47 02 20 77 de 36 1c 1c 69 6b c2 0f |..l[G. w.6..ik..|
00000030 19 d9 91 3a ab 20 96 a1 35 50 5d 72 30 2c 4f 8e |...:. ..5P]r0,O.|
00000040 bd 5e 38 3f e8 f6 b2 |.^8?...|
[2742 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2743 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032840c0 gate 1578074133348611400 evaluation starts
[2744 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032840c0 signed by 0 principal evaluation starts (used [false])
[2745 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032840c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2746 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032840c0 principal evaluation succeeds for identity 0
[2747 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032840c0 gate 1578074133348611400 evaluation succeeds
[2748 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2749 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[274a 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[274b 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[274c 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[274d 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[274e 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[274f 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 52 9e e3 0b cb c7 9f 3d bd f4 b0 f2 f9 04 7a |sR......=......z|
00000010 f1 23 a8 0c 0f 63 65 00 6e 2c b3 59 9d e5 19 aa |.#...ce.n,.Y....|
[2750 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 4f f4 d0 cb b1 f4 54 0b 53 7e |0E.!..O.....T.S~|
00000010 68 ad bc 5f 44 6b 5b 89 8e 11 53 40 2c 5c 62 60 |h.._Dk[...S@,\b`|
00000020 7d 56 a6 dd 32 02 20 79 c7 f4 96 d5 96 13 a6 3b |}V..2. y.......;|
00000030 98 80 0e 5f f7 6d c3 37 d1 b7 a9 5d 24 78 3e 1d |..._.m.7...]$x>.|
00000040 d7 cf 1e ef fc 62 28 |.....b(|
[2751 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes
[2752 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes
[2753 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2754 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2755 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 61 12 ec c3 bc 62 49 61 9c 0e de b5 47 6d 11 |1a....bIa....Gm.|
00000010 44 8c cf 30 d1 75 65 bc 14 f8 91 9f 8e f4 27 dd |D..0.ue.......'.|
[2756 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a 7e 47 ad ab f1 cb ad 9e e4 ee |0E.!..~G........|
00000010 21 d6 9b d9 2d d4 eb 91 d7 95 93 97 5c 8d ca d9 |!...-.......\...|
00000020 6c 97 f0 5f 41 02 20 04 21 c5 ae f4 87 7d 4f c3 |l.._A. .!....}O.|
00000030 ac f3 d3 0c fa 27 89 b8 0c 26 6e 89 ac 67 26 69 |.....'...&n..g&i|
00000040 d1 34 1b 65 dc 60 97 |.4.e.`.|
[2757 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes
[2758 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2759 01-03 17:55:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[275a 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[275b 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[275c 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[275d 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[275e 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[275f 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2760 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2761 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2762 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2763 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2764 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2765 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2766 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d e0 c5 24 a3 cc 89 0b 07 6f c7 73 2e ea 5e e8 |=..$.....o.s..^.|
00000010 33 a3 6b cf 2b e6 30 17 dd d0 ee 54 03 a8 1c 92 |3.k.+.0....T....|
[2767 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 a0 2e e8 5b 18 44 80 5e e1 19 |0E.!.....[.D.^..|
00000010 89 d6 9a f9 6c 98 65 34 d5 03 70 22 54 4e 8b 32 |....l.e4..p"TN.2|
00000020 52 00 a1 60 75 02 20 3b 47 67 30 49 e8 40 93 b6 |R..`u. ;Gg0I.@..|
00000030 17 9f 72 27 94 1d 2d f5 82 c3 67 92 0f 6c c4 a5 |..r'..-...g..l..|
00000040 36 07 97 db 4d 84 fc |6...M..|
[2768 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2769 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324daa0 gate 1578074133357166900 evaluation starts
[276a 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324daa0 signed by 0 principal evaluation starts (used [false])
[276b 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324daa0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[276c 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324daa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[276d 01-03 17:55:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324daa0 principal evaluation fails
[276e 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324daa0 gate 1578074133357166900 evaluation fails
[276f 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2770 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2771 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2772 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d e0 c5 24 a3 cc 89 0b 07 6f c7 73 2e ea 5e e8 |=..$.....o.s..^.|
00000010 33 a3 6b cf 2b e6 30 17 dd d0 ee 54 03 a8 1c 92 |3.k.+.0....T....|
[2773 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 a0 2e e8 5b 18 44 80 5e e1 19 |0E.!.....[.D.^..|
00000010 89 d6 9a f9 6c 98 65 34 d5 03 70 22 54 4e 8b 32 |....l.e4..p"TN.2|
00000020 52 00 a1 60 75 02 20 3b 47 67 30 49 e8 40 93 b6 |R..`u. ;Gg0I.@..|
00000030 17 9f 72 27 94 1d 2d f5 82 c3 67 92 0f 6c c4 a5 |..r'..-...g..l..|
00000040 36 07 97 db 4d 84 fc |6...M..|
[2774 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2775 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b43a0 gate 1578074133360981100 evaluation starts
[2776 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b43a0 signed by 0 principal evaluation starts (used [false])
[2777 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b43a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2778 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b43a0 principal evaluation succeeds for identity 0
[2779 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b43a0 gate 1578074133360981100 evaluation succeeds
[277a 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[277b 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[277c 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[277d 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[277e 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes
[277f 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2780 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2781 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 61 12 ec c3 bc 62 49 61 9c 0e de b5 47 6d 11 |1a....bIa....Gm.|
00000010 44 8c cf 30 d1 75 65 bc 14 f8 91 9f 8e f4 27 dd |D..0.ue.......'.|
[2782 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a 7e 47 ad ab f1 cb ad 9e e4 ee |0E.!..~G........|
00000010 21 d6 9b d9 2d d4 eb 91 d7 95 93 97 5c 8d ca d9 |!...-.......\...|
00000020 6c 97 f0 5f 41 02 20 04 21 c5 ae f4 87 7d 4f c3 |l.._A. .!....}O.|
00000030 ac f3 d3 0c fa 27 89 b8 0c 26 6e 89 ac 67 26 69 |.....'...&n..g&i|
00000040 d1 34 1b 65 dc 60 97 |.4.e.`.|
[2783 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes
[2784 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2785 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2786 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 52 9e e3 0b cb c7 9f 3d bd f4 b0 f2 f9 04 7a |sR......=......z|
00000010 f1 23 a8 0c 0f 63 65 00 6e 2c b3 59 9d e5 19 aa |.#...ce.n,.Y....|
[2787 01-03 17:55:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 4f f4 d0 cb b1 f4 54 0b 53 7e |0E.!..O.....T.S~|
00000010 68 ad bc 5f 44 6b 5b 89 8e 11 53 40 2c 5c 62 60 |h.._Dk[...S@,\b`|
00000020 7d 56 a6 dd 32 02 20 79 c7 f4 96 d5 96 13 a6 3b |}V..2. y.......;|
00000030 98 80 0e 5f f7 6d c3 37 d1 b7 a9 5d 24 78 3e 1d |..._.m.7...]$x>.|
00000040 d7 cf 1e ef fc 62 28 |.....b(|
[2788 01-03 17:55:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes
[2789 01-03 17:55:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes
[278a 01-03 17:55:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[278b 01-03 17:55:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[278c 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[278d 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[278e 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[278f 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2790 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2791 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2792 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2793 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2794 01-03 17:55:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2795 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2796 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2797 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2798 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2799 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[279a 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[279b 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[279c 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[279d 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[279e 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[279f 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[27a0 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[27a1 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[27a2 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[27a3 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[27a4 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[27a5 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f20c0 gate 1578074133489204700 evaluation starts
[27a6 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f20c0 signed by 0 principal evaluation starts (used [false])
[27a7 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f20c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[27a8 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f20c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[27a9 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f20c0 principal evaluation fails
[27aa 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f20c0 gate 1578074133489204700 evaluation fails
[27ab 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[27ac 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[27ad 01-03 17:55:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[27ae 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[27af 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[27b0 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[27b1 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f29c0 gate 1578074133491084500 evaluation starts
[27b2 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f29c0 signed by 0 principal evaluation starts (used [false])
[27b3 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f29c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[27b4 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f29c0 principal evaluation succeeds for identity 0
[27b5 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f29c0 gate 1578074133491084500 evaluation succeeds
[27b6 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[27b7 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[27b8 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[27b9 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[27ba 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27bb 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27bc 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[27bd 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[27be 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[27bf 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[27c0 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[27c1 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[27c2 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[27c3 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[27c4 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[27c5 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a420 gate 1578074133497264700 evaluation starts
[27c6 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a420 signed by 0 principal evaluation starts (used [false])
[27c7 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a420 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[27c8 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[27c9 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a420 principal evaluation fails
[27ca 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a420 gate 1578074133497264700 evaluation fails
[27cb 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[27cc 01-03 17:55:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[27cd 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[27ce 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[27cf 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[27d0 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[27d1 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[27d2 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c6fa0 gate 1578074133501370800 evaluation starts
[27d3 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c6fa0 signed by 0 principal evaluation starts (used [false])
[27d4 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c6fa0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[27d5 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c6fa0 principal evaluation succeeds for identity 0
[27d6 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c6fa0 gate 1578074133501370800 evaluation succeeds
[27d7 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[27d8 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[27d9 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[27da 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[27db 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27dc 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[27dd 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27de 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27df 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27e0 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[27e1 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[27e2 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[27e3 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[27e4 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[27e5 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[27e6 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[27e7 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[27e8 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[27e9 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ccb0 gate 1578074133505536300 evaluation starts
[27ea 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ccb0 signed by 0 principal evaluation starts (used [false])
[27eb 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ccb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[27ec 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ccb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[27ed 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ccb0 principal evaluation fails
[27ee 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332ccb0 gate 1578074133505536300 evaluation fails
[27ef 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[27f0 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[27f1 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[27f2 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[27f3 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[27f4 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[27f5 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332d5b0 gate 1578074133507797600 evaluation starts
[27f6 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332d5b0 signed by 0 principal evaluation starts (used [false])
[27f7 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332d5b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[27f8 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332d5b0 principal evaluation succeeds for identity 0
[27f9 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332d5b0 gate 1578074133507797600 evaluation succeeds
[27fa 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[27fb 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[27fc 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[27fd 01-03 17:55:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[27fe 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[27ff 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2800 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2801 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2802 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2803 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2804 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2805 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2806 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2807 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2808 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2809 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[280a 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[280b 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[280c 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033416c0 gate 1578074133514188100 evaluation starts
[280d 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033416c0 signed by 0 principal evaluation starts (used [false])
[280e 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033416c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[280f 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033416c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2810 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033416c0 principal evaluation fails
[2811 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033416c0 gate 1578074133514188100 evaluation fails
[2812 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2813 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2814 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2815 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2816 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2817 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2818 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003341fc0 gate 1578074133515650900 evaluation starts
[2819 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003341fc0 signed by 0 principal evaluation starts (used [false])
[281a 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003341fc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[281b 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003341fc0 principal evaluation succeeds for identity 0
[281c 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003341fc0 gate 1578074133515650900 evaluation succeeds
[281d 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[281e 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[281f 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2820 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2821 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2822 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2823 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2824 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2825 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2826 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2827 01-03 17:55:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2828 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2829 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[282a 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[282b 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[282c 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[282d 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[282e 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[282f 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2830 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2831 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338a380 gate 1578074133523423800 evaluation starts
[2832 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338a380 signed by 0 principal evaluation starts (used [false])
[2833 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338a380 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2834 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338a380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2835 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338a380 principal evaluation fails
[2836 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338a380 gate 1578074133523423800 evaluation fails
[2837 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2838 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2839 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[283a 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[283b 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[283c 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[283d 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338ac80 gate 1578074133526085000 evaluation starts
[283e 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338ac80 signed by 0 principal evaluation starts (used [false])
[283f 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338ac80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2840 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338ac80 principal evaluation succeeds for identity 0
[2841 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00338ac80 gate 1578074133526085000 evaluation succeeds
[2842 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2843 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2844 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2845 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2846 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2847 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2848 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2849 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[284a 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[284b 01-03 17:55:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[284c 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[284d 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[284e 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[284f 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2850 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2851 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2852 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2853 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2854 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2855 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3440 gate 1578074133532475200 evaluation starts
[2856 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3440 signed by 0 principal evaluation starts (used [false])
[2857 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3440 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2858 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2859 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3440 principal evaluation fails
[285a 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3440 gate 1578074133532475200 evaluation fails
[285b 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[285c 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[285d 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[285e 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[285f 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2860 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2861 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3d40 gate 1578074133535567800 evaluation starts
[2862 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3d40 signed by 0 principal evaluation starts (used [false])
[2863 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3d40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2864 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3d40 principal evaluation succeeds for identity 0
[2865 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a3d40 gate 1578074133535567800 evaluation succeeds
[2866 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2867 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2868 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2869 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[286a 01-03 17:55:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[286b 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[286c 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[286d 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[286e 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[286f 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2870 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12074557817817991372 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[2871 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12074557817817991372 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2872 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2873 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12074557817817991372 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[2874 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12074557817817991372 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[2875 01-03 17:55:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2876 01-03 17:55:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[2877 01-03 17:55:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2878 01-03 17:55:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2879 01-03 17:55:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[287a 01-03 17:55:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5818813646727088191 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[287b 01-03 17:55:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5818813646727088191 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[287c 01-03 17:55:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[287d 01-03 17:55:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[287e 01-03 17:55:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[287f 01-03 17:55:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2880 01-03 17:55:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2881 01-03 17:55:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2882 01-03 17:55:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2883 01-03 17:55:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2884 01-03 17:55:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[2885 01-03 17:55:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[2886 01-03 17:55:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2887 01-03 17:55:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2888 01-03 17:55:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2889 01-03 17:55:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[288a 01-03 17:55:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:16868615846479957814 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[288b 01-03 17:55:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16868615846479957814 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[288c 01-03 17:55:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[288d 01-03 17:55:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[288e 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[288f 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2890 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[2891 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2892 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 15 44 61 2e fc 49 8a 35 d9 a9 cf 7b 79 9a b2 |..Da..I.5...{y..|
00000010 43 e2 6a 11 51 b7 87 d5 27 4c 24 52 49 e1 62 41 |C.j.Q...'L$RI.bA|
[2893 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a cb eb cc 0e 1f 5d 92 7c e7 9a 86 |0D. Z.....].|...|
00000010 84 06 24 89 41 a1 f5 b7 80 20 f8 57 d1 3b ed 89 |..$.A.... .W.;..|
00000020 dc e2 a0 69 02 20 2b 18 5f 65 e8 e7 16 8c 35 17 |...i. +._e....5.|
00000030 87 76 38 76 63 e4 03 15 28 f4 fd f7 7d 67 25 7d |.v8vc...(...}g%}|
00000040 80 8d fa 6b c7 60 |...k.`|
[2894 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2895 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 60 3a d0 c6 7b 97 62 21 9f 58 28 |0D. G`:..{.b!.X(|
00000010 0b e9 8e 49 70 de 32 a2 3d 02 8f dd 57 5d 51 34 |...Ip.2.=...W]Q4|
00000020 ee 1e c8 ff 02 20 1e 54 27 a0 05 18 5a 0a 99 68 |..... .T'...Z..h|
00000030 0d 14 38 c5 02 17 aa 60 76 83 50 e4 a4 19 3f 14 |..8....`v.P...?.|
00000040 02 b8 05 90 72 a2 |....r.|
[2896 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2897 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[2898 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:41
[2899 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:41
[289a 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[289b 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[289c 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[289d 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[289e 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[289f 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28a0 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28a1 01-03 17:55:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[28a2 01-03 17:55:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[28a3 01-03 17:55:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[28a4 01-03 17:55:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28a5 01-03 17:55:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[28a6 01-03 17:55:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[28a7 01-03 17:55:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315100B1801
[28a8 01-03 17:55:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F190552DB9D73294112FD95180B43EA75EC66F72A4AB1902DE6A8022972268B6
[28a9 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[28aa 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ab 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ac 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ad 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ae 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[28af 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[28b0 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28b1 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28b2 01-03 17:55:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28b3 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes
[28b4 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28b5 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes
[28b6 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[28b7 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 6a 58 2b 9a aa a4 53 d0 9d cf ec 69 7c ed 12 |.jX+...S....i|..|
00000010 bf b8 8c 02 f2 7b c7 01 94 29 ff e7 66 ba ab 9b |.....{...)..f...|
[28b8 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 6c ad 7f 9f 42 d1 95 dc dd d6 24 |0D. xl...B.....$|
00000010 87 9c cf cd 61 4b d4 22 01 b7 6c ea 7a 52 67 79 |....aK."..l.zRgy|
00000020 9a 6a 7e 2c 02 20 3b 9f 5c bd 8a 59 41 2f e0 dc |.j~,. ;.\..YA/..|
00000030 d8 7f 1a fe df 36 5e 9f e9 78 34 34 d8 b2 18 ce |.....6^..x44....|
00000040 b6 56 fd 52 9b ce |.V.R..|
[28b9 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[28ba 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 68 60 88 dc fa ff 35 6c 47 86 45 41 |0C..h`....5lG.EA|
00000010 2a 33 92 98 69 f9 aa cd 23 5c b3 25 f5 9a d5 0c |*3..i...#\.%....|
00000020 f4 4c 2c 02 20 1a b5 82 9e 8d 43 bb 51 bf d4 ee |.L,. .....C.Q...|
00000030 40 99 7f 76 5d 64 ee 2b 68 1b 7d 8c 7b b3 fd ec |@..v]d.+h.}.{...|
00000040 66 f5 2c 48 96 |f.,H.|
[28bb 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes
[28bc 01-03 17:55:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes]}
[28bd 01-03 17:55:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42
[28be 01-03 17:55:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42
[28bf 01-03 17:55:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[28c0 01-03 17:55:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28c1 01-03 17:55:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28c2 01-03 17:55:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28c3 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28c4 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28c5 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28c6 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[28c7 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28c8 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[28c9 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[28ca 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28cb 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[28cc 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28cd 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[28ce 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[28cf 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28d0 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[28d1 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28d2 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[28d3 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[28d4 01-03 17:55:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28d5 01-03 17:55:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[28d6 01-03 17:55:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28d7 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:15231780081730557087 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[28d8 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:15231780081730557087 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[28d9 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15231780081730557087 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[28da 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28db 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28dc 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28dd 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28de 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28df 01-03 17:55:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28e0 01-03 17:55:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[28e1 01-03 17:55:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28e2 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:14515402521047219859 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[28e3 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14515402521047219859 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[28e4 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14515402521047219859 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[28e5 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28e6 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28e7 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28e8 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28e9 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ea 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28eb 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[28ec 01-03 17:55:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28ed 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[28ee 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[28ef 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28f0 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[28f1 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[28f2 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28f3 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[28f4 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[28f5 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[28f6 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[28f7 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[28f8 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[28f9 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 14 f6 62 fd ea 9d d3 c4 20 dd e1 b6 d6 05 38 |...b..... .....8|
00000010 1a 48 26 cc 66 41 36 bf d4 ca d7 d2 8c 7d 81 7d |.H&.fA6......}.}|
[28fa 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 5f 7e 34 30 73 90 ef 3f 79 ac b8 |0D. 7_~40s..?y..|
00000010 43 00 07 e1 bd 35 e4 16 49 5d 04 94 ce 32 f6 1d |C....5..I]...2..|
00000020 e9 59 07 66 02 20 39 bc e7 1c 67 91 36 a4 9c ad |.Y.f. 9...g.6...|
00000030 4e 7c ed 3b 53 93 90 93 38 6e 3f 00 df d3 20 de |N|.;S...8n?... .|
00000040 57 b4 e7 56 f5 fa |W..V..|
[28fb 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[28fc 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475320 gate 1578074137113198300 evaluation starts
[28fd 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475320 signed by 0 principal evaluation starts (used [false])
[28fe 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475320 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[28ff 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2900 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475320 principal evaluation fails
[2901 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475320 gate 1578074137113198300 evaluation fails
[2902 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2903 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2904 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2905 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 14 f6 62 fd ea 9d d3 c4 20 dd e1 b6 d6 05 38 |...b..... .....8|
00000010 1a 48 26 cc 66 41 36 bf d4 ca d7 d2 8c 7d 81 7d |.H&.fA6......}.}|
[2906 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 5f 7e 34 30 73 90 ef 3f 79 ac b8 |0D. 7_~40s..?y..|
00000010 43 00 07 e1 bd 35 e4 16 49 5d 04 94 ce 32 f6 1d |C....5..I]...2..|
00000020 e9 59 07 66 02 20 39 bc e7 1c 67 91 36 a4 9c ad |.Y.f. 9...g.6...|
00000030 4e 7c ed 3b 53 93 90 93 38 6e 3f 00 df d3 20 de |N|.;S...8n?... .|
00000040 57 b4 e7 56 f5 fa |W..V..|
[2907 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2908 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475c20 gate 1578074137113825900 evaluation starts
[2909 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475c20 signed by 0 principal evaluation starts (used [false])
[290a 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475c20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[290b 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475c20 principal evaluation succeeds for identity 0
[290c 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475c20 gate 1578074137113825900 evaluation succeeds
[290d 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[290e 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[290f 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2910 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2911 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2912 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}
[2913 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41
[2914 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41
[2915 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2916 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2917 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2918 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2919 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[291a 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[291b 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[291c 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[291d 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[291e 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[291f 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[2920 01-03 17:55:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2921 01-03 17:55:37.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2922 01-03 17:55:37.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2923 01-03 17:55:37.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2924 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2925 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[2926 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2927 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2928 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2929 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[292a 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[292b 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[292c 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[292d 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd fd 21 16 7f d9 7b f8 67 42 f5 13 68 2c e5 d0 |..!...{.gB..h,..|
00000010 49 b1 b9 46 db 89 7f 46 81 6d d9 3e b6 59 d2 fb |I..F...F.m.>.Y..|
[292e 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 28 ad 91 ef fe ef 76 a7 24 01 9a |0D. L(.....v.$..|
00000010 33 bc 83 6b 10 69 71 a5 f6 81 0a ca 71 d2 c5 ca |3..k.iq.....q...|
00000020 17 0a 43 2c 02 20 3d d6 19 3e 34 09 45 f8 71 7b |..C,. =..>4.E.q{|
00000030 8d 5a 2d b8 9b 95 8e c2 21 f1 56 77 3e 0b 6c c7 |.Z-.....!.Vw>.l.|
00000040 7f 92 cf 85 ef 7e |.....~|
[292f 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2930 01-03 17:55:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4050 gate 1578074137147908500 evaluation starts
[2931 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4050 signed by 0 principal evaluation starts (used [false])
[2932 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4050 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2933 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2934 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4050 principal evaluation fails
[2935 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4050 gate 1578074137147908500 evaluation fails
[2936 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2937 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2938 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2939 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd fd 21 16 7f d9 7b f8 67 42 f5 13 68 2c e5 d0 |..!...{.gB..h,..|
00000010 49 b1 b9 46 db 89 7f 46 81 6d d9 3e b6 59 d2 fb |I..F...F.m.>.Y..|
[293a 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 28 ad 91 ef fe ef 76 a7 24 01 9a |0D. L(.....v.$..|
00000010 33 bc 83 6b 10 69 71 a5 f6 81 0a ca 71 d2 c5 ca |3..k.iq.....q...|
00000020 17 0a 43 2c 02 20 3d d6 19 3e 34 09 45 f8 71 7b |..C,. =..>4.E.q{|
00000030 8d 5a 2d b8 9b 95 8e c2 21 f1 56 77 3e 0b 6c c7 |.Z-.....!.Vw>.l.|
00000040 7f 92 cf 85 ef 7e |.....~|
[293b 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[293c 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4950 gate 1578074137153683000 evaluation starts
[293d 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4950 signed by 0 principal evaluation starts (used [false])
[293e 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4950 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[293f 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4950 principal evaluation succeeds for identity 0
[2940 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4950 gate 1578074137153683000 evaluation succeeds
[2941 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2942 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2943 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2944 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2945 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2946 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes]}
[2947 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39
[2948 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39
[2949 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[294a 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[294b 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[294c 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[294d 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[294e 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[294f 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2950 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2951 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[2952 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2953 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2954 01-03 17:55:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2955 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2956 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7336682310978231122 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2957 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[2958 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7336682310978231122 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2959 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[295a 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15231347888535364082 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[295b 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[295c 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5732576972236158667 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[295d 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15231347888535364082 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[295e 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[295f 01-03 17:55:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5732576972236158667 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2960 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2961 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5732576972236158667 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[2962 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5732576972236158667 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[2963 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5732576972236158667 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[2964 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2965 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15231347888535364082 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2966 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15231347888535364082 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2967 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15231347888535364082 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2968 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2969 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7336682310978231122 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[296a 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7336682310978231122 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[296b 01-03 17:55:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[296c 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151026
[296d 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BE6608DE6676AC3BC6DC47950A195D6D712D9033ED28BC040407A971481949AA
[296e 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[296f 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2970 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2971 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2972 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[2973 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2974 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2975 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2976 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2977 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[2978 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2979 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[297a 01-03 17:55:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[297b 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 534 bytes, Signature: 0 bytes
[297c 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[297d 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 534 bytes, Signature: 0 bytes
[297e 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[297f 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 66 08 de 66 76 ac 3b c6 dc 47 95 0a 19 5d 6d |.f..fv.;..G...]m|
00000010 71 2d 90 33 ed 28 bc 04 04 07 a9 71 48 19 49 aa |q-.3.(.....qH.I.|
[2980 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 ea 86 0a fd c1 70 9a b8 8e d7 b5 |0D. X.....p.....|
00000010 dd 9c f5 50 e5 0b 51 d2 96 69 44 9b 69 91 dc 53 |...P..Q..iD.i..S|
00000020 f7 f2 0c 7a 02 20 37 2a 85 10 2d 8d 62 c3 be a6 |...z. 7*..-.b...|
00000030 b1 20 4e 8d a5 e4 f4 36 af 5b e9 0f bc 88 63 ca |. N....6.[....c.|
00000040 24 42 19 65 44 d8 |$B.eD.|
[2981 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2982 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 d1 ce 41 a6 84 c1 0b 5b 3c 14 cb |0D. !..A....[<..|
00000010 cf f5 3e 37 ec c6 2c f4 c9 6a 76 d5 43 d0 09 8c |..>7..,..jv.C...|
00000020 16 e5 19 74 02 20 2f cd e9 81 82 1e 4b 47 77 6a |...t. /.....KGwj|
00000030 50 17 e1 7b ea 4e b8 23 9d 63 19 a0 cc d5 8a e8 |P..{.N.#.c......|
00000040 4f fa 2c fc ae 5f |O.,.._|
[2983 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2984 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2985 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2986 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2987 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[2988 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[2989 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[298a 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[298b 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[298c 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 66 08 de 66 76 ac 3b c6 dc 47 95 0a 19 5d 6d |.f..fv.;..G...]m|
00000010 71 2d 90 33 ed 28 bc 04 04 07 a9 71 48 19 49 aa |q-.3.(.....qH.I.|
[298d 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 ea 86 0a fd c1 70 9a b8 8e d7 b5 |0D. X.....p.....|
00000010 dd 9c f5 50 e5 0b 51 d2 96 69 44 9b 69 91 dc 53 |...P..Q..iD.i..S|
00000020 f7 f2 0c 7a 02 20 37 2a 85 10 2d 8d 62 c3 be a6 |...z. 7*..-.b...|
00000030 b1 20 4e 8d a5 e4 f4 36 af 5b e9 0f bc 88 63 ca |. N....6.[....c.|
00000040 24 42 19 65 44 d8 |$B.eD.|
[298e 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes
[298f 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes
[2990 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2991 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[2992 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2993 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2994 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2995 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2996 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2997 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2998 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2999 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[299b 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[299a 01-03 17:55:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd fd 21 16 7f d9 7b f8 67 42 f5 13 68 2c e5 d0 |..!...{.gB..h,..|
00000010 49 b1 b9 46 db 89 7f 46 81 6d d9 3e b6 59 d2 fb |I..F...F.m.>.Y..|
[299c 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 28 ad 91 ef fe ef 76 a7 24 01 9a |0D. L(.....v.$..|
00000010 33 bc 83 6b 10 69 71 a5 f6 81 0a ca 71 d2 c5 ca |3..k.iq.....q...|
00000020 17 0a 43 2c 02 20 3d d6 19 3e 34 09 45 f8 71 7b |..C,. =..>4.E.q{|
00000030 8d 5a 2d b8 9b 95 8e c2 21 f1 56 77 3e 0b 6c c7 |.Z-.....!.Vw>.l.|
00000040 7f 92 cf 85 ef 7e |.....~|
[299d 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[299e 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a3b0 gate 1578074137350836000 evaluation starts
[299f 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a3b0 signed by 0 principal evaluation starts (used [false])
[29a0 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a3b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[29a1 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[29a2 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a3b0 principal evaluation fails
[29a3 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a3b0 gate 1578074137350836000 evaluation fails
[29a4 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[29a5 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[29a6 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[29a7 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd fd 21 16 7f d9 7b f8 67 42 f5 13 68 2c e5 d0 |..!...{.gB..h,..|
00000010 49 b1 b9 46 db 89 7f 46 81 6d d9 3e b6 59 d2 fb |I..F...F.m.>.Y..|
[29a8 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 28 ad 91 ef fe ef 76 a7 24 01 9a |0D. L(.....v.$..|
00000010 33 bc 83 6b 10 69 71 a5 f6 81 0a ca 71 d2 c5 ca |3..k.iq.....q...|
00000020 17 0a 43 2c 02 20 3d d6 19 3e 34 09 45 f8 71 7b |..C,. =..>4.E.q{|
00000030 8d 5a 2d b8 9b 95 8e c2 21 f1 56 77 3e 0b 6c c7 |.Z-.....!.Vw>.l.|
00000040 7f 92 cf 85 ef 7e |.....~|
[29a9 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[29aa 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5b40 gate 1578074137353028900 evaluation starts
[29ab 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5b40 signed by 0 principal evaluation starts (used [false])
[29ac 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5b40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[29ad 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5b40 principal evaluation succeeds for identity 0
[29ae 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5b40 gate 1578074137353028900 evaluation succeeds
[29af 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[29b0 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[29b1 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[29b2 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[29b3 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[29b4 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29b5 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29b6 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[29b8 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[29b7 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29b9 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29ba 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[29bb 01-03 17:55:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[29bc 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[29bd 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[29be 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[29bf 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[29c0 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 14 f6 62 fd ea 9d d3 c4 20 dd e1 b6 d6 05 38 |...b..... .....8|
00000010 1a 48 26 cc 66 41 36 bf d4 ca d7 d2 8c 7d 81 7d |.H&.fA6......}.}|
[29c1 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 5f 7e 34 30 73 90 ef 3f 79 ac b8 |0D. 7_~40s..?y..|
00000010 43 00 07 e1 bd 35 e4 16 49 5d 04 94 ce 32 f6 1d |C....5..I]...2..|
00000020 e9 59 07 66 02 20 39 bc e7 1c 67 91 36 a4 9c ad |.Y.f. 9...g.6...|
00000030 4e 7c ed 3b 53 93 90 93 38 6e 3f 00 df d3 20 de |N|.;S...8n?... .|
00000040 57 b4 e7 56 f5 fa |W..V..|
[29c2 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[29c3 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003527970 gate 1578074137363077100 evaluation starts
[29c4 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003527970 signed by 0 principal evaluation starts (used [false])
[29c5 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003527970 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[29c6 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003527970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[29c7 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003527970 principal evaluation fails
[29c8 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003527970 gate 1578074137363077100 evaluation fails
[29c9 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[29ca 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[29cb 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[29cc 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 14 f6 62 fd ea 9d d3 c4 20 dd e1 b6 d6 05 38 |...b..... .....8|
00000010 1a 48 26 cc 66 41 36 bf d4 ca d7 d2 8c 7d 81 7d |.H&.fA6......}.}|
[29cd 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 5f 7e 34 30 73 90 ef 3f 79 ac b8 |0D. 7_~40s..?y..|
00000010 43 00 07 e1 bd 35 e4 16 49 5d 04 94 ce 32 f6 1d |C....5..I]...2..|
00000020 e9 59 07 66 02 20 39 bc e7 1c 67 91 36 a4 9c ad |.Y.f. 9...g.6...|
00000030 4e 7c ed 3b 53 93 90 93 38 6e 3f 00 df d3 20 de |N|.;S...8n?... .|
00000040 57 b4 e7 56 f5 fa |W..V..|
[29ce 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[29cf 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546270 gate 1578074137364756600 evaluation starts
[29d0 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546270 signed by 0 principal evaluation starts (used [false])
[29d1 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546270 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[29d2 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546270 principal evaluation succeeds for identity 0
[29d3 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546270 gate 1578074137364756600 evaluation succeeds
[29d4 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[29d5 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[29d6 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[29d7 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[29d8 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[29d9 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29da 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[29db 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 66 08 de 66 76 ac 3b c6 dc 47 95 0a 19 5d 6d |.f..fv.;..G...]m|
00000010 71 2d 90 33 ed 28 bc 04 04 07 a9 71 48 19 49 aa |q-.3.(.....qH.I.|
[29dc 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 ea 86 0a fd c1 70 9a b8 8e d7 b5 |0D. X.....p.....|
00000010 dd 9c f5 50 e5 0b 51 d2 96 69 44 9b 69 91 dc 53 |...P..Q..iD.i..S|
00000020 f7 f2 0c 7a 02 20 37 2a 85 10 2d 8d 62 c3 be a6 |...z. 7*..-.b...|
00000030 b1 20 4e 8d a5 e4 f4 36 af 5b e9 0f bc 88 63 ca |. N....6.[....c.|
00000040 24 42 19 65 44 d8 |$B.eD.|
[29dd 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes
[29de 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes
[29df 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29e0 01-03 17:55:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29e1 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29e2 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29e3 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[29e4 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[29e5 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29e6 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[29e7 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29e8 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[29e9 01-03 17:55:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29ea 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[29eb 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[29ec 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[29ed 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[29ee 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[29ef 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[29f0 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[29f1 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29f2 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29f3 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[29f4 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[29f5 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[29f6 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[29f7 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[29f8 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[29f9 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[29fa 01-03 17:55:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[29fb 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[29fc 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567900 gate 1578074137490562400 evaluation starts
[29fd 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567900 signed by 0 principal evaluation starts (used [false])
[29fe 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567900 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[29ff 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2a00 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567900 principal evaluation fails
[2a01 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567900 gate 1578074137490562400 evaluation fails
[2a02 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2a03 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2a04 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2a05 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2a06 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2a07 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a08 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a2200 gate 1578074137498940100 evaluation starts
[2a09 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a2200 signed by 0 principal evaluation starts (used [false])
[2a0a 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a2200 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2a0b 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a2200 principal evaluation succeeds for identity 0
[2a0c 01-03 17:55:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a2200 gate 1578074137498940100 evaluation succeeds
[2a0d 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2a0e 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2a0f 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2a10 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2a11 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a12 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a13 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2a14 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2a15 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2a16 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2a17 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2a18 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2a19 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2a1a 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2a1b 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a1c 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3c60 gate 1578074137504487500 evaluation starts
[2a1d 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3c60 signed by 0 principal evaluation starts (used [false])
[2a1e 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3c60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2a1f 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2a20 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3c60 principal evaluation fails
[2a21 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3c60 gate 1578074137504487500 evaluation fails
[2a22 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2a23 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2a24 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2a25 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2a26 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2a27 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a28 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c6560 gate 1578074137508123400 evaluation starts
[2a29 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c6560 signed by 0 principal evaluation starts (used [false])
[2a2a 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c6560 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2a2b 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c6560 principal evaluation succeeds for identity 0
[2a2c 01-03 17:55:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c6560 gate 1578074137508123400 evaluation succeeds
[2a2d 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2a2e 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2a2f 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2a30 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2a31 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a32 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2a33 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a34 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a35 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a36 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2a37 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2a38 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2a39 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2a3a 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2a3b 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2a3c 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2a3d 01-03 17:55:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2a3e 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a3f 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8270 gate 1578074137520494200 evaluation starts
[2a40 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8270 signed by 0 principal evaluation starts (used [false])
[2a41 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8270 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2a42 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2a43 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8270 principal evaluation fails
[2a44 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8270 gate 1578074137520494200 evaluation fails
[2a45 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2a46 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2a47 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2a48 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2a49 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2a4a 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a4b 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8b70 gate 1578074137523653700 evaluation starts
[2a4c 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8b70 signed by 0 principal evaluation starts (used [false])
[2a4d 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8b70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2a4e 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8b70 principal evaluation succeeds for identity 0
[2a4f 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8b70 gate 1578074137523653700 evaluation succeeds
[2a50 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2a51 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2a52 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2a53 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2a54 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2a55 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2a56 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a57 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a58 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2a59 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2a5a 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2a5b 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2a5c 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2a5d 01-03 17:55:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2a5e 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2a5f 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2a60 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a61 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fcc80 gate 1578074137531488500 evaluation starts
[2a62 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fcc80 signed by 0 principal evaluation starts (used [false])
[2a63 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fcc80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2a64 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fcc80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2a65 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fcc80 principal evaluation fails
[2a66 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fcc80 gate 1578074137531488500 evaluation fails
[2a67 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2a68 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2a69 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2a6a 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2a6b 01-03 17:55:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2a6c 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a6d 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fd580 gate 1578074137544774200 evaluation starts
[2a6e 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fd580 signed by 0 principal evaluation starts (used [false])
[2a6f 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fd580 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2a70 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fd580 principal evaluation succeeds for identity 0
[2a71 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fd580 gate 1578074137544774200 evaluation succeeds
[2a72 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2a73 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2a74 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2a75 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2a76 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2a77 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2a78 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a79 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2a7a 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a7b 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a7c 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a7d 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2a7e 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2a7f 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2a80 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2a81 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2a82 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2a83 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2a84 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2a85 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a86 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003621940 gate 1578074137549659900 evaluation starts
[2a87 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003621940 signed by 0 principal evaluation starts (used [false])
[2a88 01-03 17:55:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003621940 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2a89 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003621940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2a8a 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003621940 principal evaluation fails
[2a8b 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003621940 gate 1578074137549659900 evaluation fails
[2a8c 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2a8d 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2a8e 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2a8f 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2a90 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2a91 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a92 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a240 gate 1578074137551507800 evaluation starts
[2a93 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a240 signed by 0 principal evaluation starts (used [false])
[2a94 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a240 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2a95 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a240 principal evaluation succeeds for identity 0
[2a96 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a240 gate 1578074137551507800 evaluation succeeds
[2a97 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2a98 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2a99 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2a9a 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2a9b 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a9c 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a9e 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[2a9d 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2a9f 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2aa0 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2aa1 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2aa2 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12383931250208016393 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[2aa3 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12383931250208016393 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2aa4 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2aa5 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2aa6 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2aa7 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2aa8 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2aa9 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2aaa 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2aab 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2aac 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2aad 01-03 17:55:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2aae 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2aaf 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2ab0 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2ab1 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2ab2 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003672a00 gate 1578074137560989800 evaluation starts
[2ab3 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003672a00 signed by 0 principal evaluation starts (used [false])
[2ab4 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003672a00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2ab5 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003672a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2ab6 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003672a00 principal evaluation fails
[2ab7 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003672a00 gate 1578074137560989800 evaluation fails
[2ab8 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2ab9 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2aba 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2abb 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2abc 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2abd 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2abe 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003673300 gate 1578074137563170500 evaluation starts
[2abf 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003673300 signed by 0 principal evaluation starts (used [false])
[2ac0 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003673300 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2ac1 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003673300 principal evaluation succeeds for identity 0
[2ac2 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003673300 gate 1578074137563170500 evaluation succeeds
[2ac3 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2ac4 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2ac5 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ac6 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ac7 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ac8 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12383931250208016393 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[2ac9 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12383931250208016393 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[2aca 01-03 17:55:37.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2acb 01-03 17:55:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[2acc 01-03 17:55:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2acd 01-03 17:55:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ace 01-03 17:55:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2acf 01-03 17:55:37.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2016648325149534744 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2ad0 01-03 17:55:37.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2016648325149534744 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2ad1 01-03 17:55:37.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2ad2 01-03 17:55:37.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ad3 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2ad4 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2ad5 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ad6 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2ad7 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[2ad8 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ad9 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2ada 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2adb 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2adc 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2add 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2ade 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2adf 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 36 a5 95 4a d0 19 ba 84 60 f8 d1 7c 75 99 07 |.6..J....`..|u..|
00000010 11 09 e4 ea dd 76 48 65 87 fd d9 10 c8 94 ae ee |.....vHe........|
[2ae0 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 97 9e 7c 23 c3 93 00 e6 f4 63 92 |0D. J..|#.....c.|
00000010 b6 79 ab a5 55 f1 c1 eb 42 47 88 65 4e 2e 37 54 |.y..U...BG.eN.7T|
00000020 da 99 60 6f 02 20 4f 45 b0 bf 8f 6c 1e 23 e4 aa |..`o. OE...l.#..|
00000030 ad 04 ca 68 21 83 84 b3 8e 08 db 6f 53 b4 b7 40 |...h!......oS..@|
00000040 ff 9c b8 1c 52 f7 |....R.|
[2ae1 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2ae2 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368f640 gate 1578074138017272400 evaluation starts
[2ae3 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368f640 signed by 0 principal evaluation starts (used [false])
[2ae4 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368f640 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2ae5 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368f640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2ae6 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368f640 principal evaluation fails
[2ae7 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368f640 gate 1578074138017272400 evaluation fails
[2ae8 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2ae9 01-03 17:55:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2aea 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2aeb 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 36 a5 95 4a d0 19 ba 84 60 f8 d1 7c 75 99 07 |.6..J....`..|u..|
00000010 11 09 e4 ea dd 76 48 65 87 fd d9 10 c8 94 ae ee |.....vHe........|
[2aec 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 97 9e 7c 23 c3 93 00 e6 f4 63 92 |0D. J..|#.....c.|
00000010 b6 79 ab a5 55 f1 c1 eb 42 47 88 65 4e 2e 37 54 |.y..U...BG.eN.7T|
00000020 da 99 60 6f 02 20 4f 45 b0 bf 8f 6c 1e 23 e4 aa |..`o. OE...l.#..|
00000030 ad 04 ca 68 21 83 84 b3 8e 08 db 6f 53 b4 b7 40 |...h!......oS..@|
00000040 ff 9c b8 1c 52 f7 |....R.|
[2aed 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2aee 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a6130 gate 1578074138022096700 evaluation starts
[2aef 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a6130 signed by 0 principal evaluation starts (used [false])
[2af0 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a6130 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2af1 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a6130 principal evaluation succeeds for identity 0
[2af2 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a6130 gate 1578074138022096700 evaluation succeeds
[2af3 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2af4 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2af5 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2af6 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2af7 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2af8 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes]}
[2af9 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40
[2afa 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40
[2afb 01-03 17:55:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2afc 01-03 17:55:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2afd 01-03 17:55:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2afe 01-03 17:55:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2aff 01-03 17:55:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2b00 01-03 17:55:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2b01 01-03 17:55:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b02 01-03 17:55:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2b03 01-03 17:55:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b04 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b05 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b06 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b07 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b08 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b09 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b0a 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2b0b 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b0c 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b0d 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2b0e 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b0f 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2b10 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2b11 01-03 17:55:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b12 01-03 17:55:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2b13 01-03 17:55:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b14 01-03 17:55:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2b15 01-03 17:55:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b16 01-03 17:55:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b17 01-03 17:55:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b18 01-03 17:55:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b19 01-03 17:55:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b1a 01-03 17:55:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2b1b 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b1c 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2b1d 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2b1e 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2b1f 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2b20 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2b21 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2b22 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b df 25 8a e4 99 e9 99 c4 e0 c8 e0 fe aa ce 15 |k.%.............|
00000010 b4 56 70 e4 e9 6e f7 c7 fb 86 7d 5f 84 19 b7 6f |.Vp..n....}_...o|
[2b23 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 9a 30 43 5a 4a 38 89 7b ce 9a b2 |0D. ..0CZJ8.{...|
00000010 32 24 2f 35 ea 26 95 d6 d7 22 10 eb 7e 18 f9 cb |2$/5.&..."..~...|
00000020 a8 16 6e a6 02 20 15 e6 29 77 15 83 86 83 f5 e1 |..n.. ..)w......|
00000030 00 e0 1e f9 05 48 aa a0 40 0b 59 26 b7 c6 4e 70 |.....H..@.Y&..Np|
00000040 07 4a 2c db 72 17 |.J,.r.|
[2b24 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b25 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003727850 gate 1578074138096852900 evaluation starts
[2b26 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003727850 signed by 0 principal evaluation starts (used [false])
[2b27 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003727850 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2b28 01-03 17:55:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003727850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2b29 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003727850 principal evaluation fails
[2b2a 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003727850 gate 1578074138096852900 evaluation fails
[2b2b 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2b2c 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2b2d 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2b2e 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b df 25 8a e4 99 e9 99 c4 e0 c8 e0 fe aa ce 15 |k.%.............|
00000010 b4 56 70 e4 e9 6e f7 c7 fb 86 7d 5f 84 19 b7 6f |.Vp..n....}_...o|
[2b2f 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 9a 30 43 5a 4a 38 89 7b ce 9a b2 |0D. ..0CZJ8.{...|
00000010 32 24 2f 35 ea 26 95 d6 d7 22 10 eb 7e 18 f9 cb |2$/5.&..."..~...|
00000020 a8 16 6e a6 02 20 15 e6 29 77 15 83 86 83 f5 e1 |..n.. ..)w......|
00000030 00 e0 1e f9 05 48 aa a0 40 0b 59 26 b7 c6 4e 70 |.....H..@.Y&..Np|
00000040 07 4a 2c db 72 17 |.J,.r.|
[2b30 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b31 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003776150 gate 1578074138103408500 evaluation starts
[2b32 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003776150 signed by 0 principal evaluation starts (used [false])
[2b33 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003776150 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2b34 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003776150 principal evaluation succeeds for identity 0
[2b35 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003776150 gate 1578074138103408500 evaluation succeeds
[2b36 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2b37 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2b38 01-03 17:55:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b39 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b3a 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2b3b 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2b3c 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b3d 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes]}
[2b3e 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42
[2b3f 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42
[2b40 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2b41 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b42 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b43 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b44 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b45 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b46 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b47 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b48 01-03 17:55:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b49 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b4a 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b4b 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b4c 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b4d 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b4e 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2b4f 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b50 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2b51 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b52 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b53 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b54 01-03 17:55:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b55 01-03 17:55:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b56 01-03 17:55:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b57 01-03 17:55:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b58 01-03 17:55:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b59 01-03 17:55:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2b5a 01-03 17:55:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2b5b 01-03 17:55:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b5c 01-03 17:55:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b5d 01-03 17:55:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b5e 01-03 17:55:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b5f 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151027
[2b60 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1709E15A839C9EA065189911CD84D1A8B558DBE54EB05311A210B903620AA2BD
[2b61 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2b62 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2b63 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2b64 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b65 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b66 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[2b67 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b68 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2b69 01-03 17:55:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b6a 01-03 17:55:38.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2b6b 01-03 17:55:38.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2b6c 01-03 17:55:38.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b6d 01-03 17:55:38.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2b6e 01-03 17:55:38.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b6f 01-03 17:55:38.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2b70 01-03 17:55:38.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b71 01-03 17:55:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[2b72 01-03 17:55:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[2b73 01-03 17:55:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b74 01-03 17:55:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b75 01-03 17:55:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b76 01-03 17:55:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b77 01-03 17:55:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:1217218287213572905 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2b78 01-03 17:55:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1217218287213572905 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2b79 01-03 17:55:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2b7a 01-03 17:55:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b7b 01-03 17:55:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2b7c 01-03 17:55:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b7d 01-03 17:55:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2b7e 01-03 17:55:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2b7f 01-03 17:55:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 34 36 52 5b 29 a6 5b e0 69 5d 15 19 e5 d9 b8 |.46R[).[.i].....|
00000010 2a 4b f8 95 a4 dd 78 06 36 10 65 09 b9 4d f3 7d |*K....x.6.e..M.}|
[2b80 01-03 17:55:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 05 1c 73 43 c4 e5 56 27 c6 fb 0c |0D. M..sC..V'...|
00000010 10 80 e0 c3 7a c3 d9 75 36 2d da 5c a6 a0 1f e2 |....z..u6-.\....|
00000020 99 c7 de 2d 02 20 27 40 24 78 2b b2 5a f0 84 b7 |...-. '@$x+.Z...|
00000030 bf b1 f6 74 0a b9 21 e5 bb a6 87 4d 0b 98 b8 d0 |...t..!....M....|
00000040 91 b1 07 1d db ea |......|
[2b81 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2b82 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 70 e9 7f c9 cf 70 7c 08 92 4b |0E.!..p....p|..K|
00000010 32 78 b1 da 01 f5 47 0a 6a e2 0a d7 30 f9 30 50 |2x....G.j...0.0P|
00000020 1e 28 9b e2 11 02 20 6b cc 5e 00 a5 ea c8 2b 19 |.(.... k.^....+.|
00000030 cc ae 35 cd e7 a2 be 60 37 9c 7c f8 35 db 8a 03 |..5....`7.|.5...|
00000040 19 35 25 06 d7 34 77 |.5%..4w|
[2b83 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2b84 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[2b85 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43
[2b86 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43
[2b87 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes in aliveMembership
[2b88 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b89 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b8a 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b8b 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2b8c 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b8d 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b8e 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[2b8f 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[2b90 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[2b91 01-03 17:55:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b92 01-03 17:55:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13143196033710802780 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2b93 01-03 17:55:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:13143196033710802780 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2b94 01-03 17:55:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13143196033710802780 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2b95 01-03 17:55:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b96 01-03 17:55:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b97 01-03 17:55:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b98 01-03 17:55:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b99 01-03 17:55:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b9a 01-03 17:55:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b9b 01-03 17:55:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[2b9c 01-03 17:55:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b9d 01-03 17:55:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:887527368684232596 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2b9e 01-03 17:55:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:887527368684232596 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2b9f 01-03 17:55:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:887527368684232596 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2ba0 01-03 17:55:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ba1 01-03 17:55:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ba2 01-03 17:55:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ba3 01-03 17:55:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ba4 01-03 17:55:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ba5 01-03 17:55:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ba6 01-03 17:55:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[2ba7 01-03 17:55:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ba8 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2ba9 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2baa 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bab 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2bac 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2bad 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bae 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2baf 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2bb0 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2bb1 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2bb2 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2bb3 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2bb4 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 29 87 8d f2 16 e5 fc 03 9a 9e f7 b0 c3 2b dc |.)............+.|
00000010 53 15 70 d3 cd 96 fe 37 45 6a 65 7a 0b 16 81 a4 |S.p....7Ejez....|
[2bb5 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 69 ea 2c 92 7a 9a 95 52 e8 fe a3 |0D. .i.,.z..R...|
00000010 43 9e fe bc e1 91 5e bd d3 39 b7 ba 97 96 8a 89 |C.....^..9......|
00000020 96 a1 3b 69 02 20 70 31 02 52 cc 54 d2 26 55 eb |..;i. p1.R.T.&U.|
00000030 fa 78 2d b9 f1 f5 12 4f eb 7f a6 c3 52 8a ec c3 |.x-....O....R...|
00000040 d0 f5 b0 2a ba 73 |...*.s|
[2bb6 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2bb7 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885550 gate 1578074141117394500 evaluation starts
[2bb8 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885550 signed by 0 principal evaluation starts (used [false])
[2bb9 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885550 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2bba 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2bbb 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885550 principal evaluation fails
[2bbc 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885550 gate 1578074141117394500 evaluation fails
[2bbd 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2bbe 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2bbf 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2bc0 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 29 87 8d f2 16 e5 fc 03 9a 9e f7 b0 c3 2b dc |.)............+.|
00000010 53 15 70 d3 cd 96 fe 37 45 6a 65 7a 0b 16 81 a4 |S.p....7Ejez....|
[2bc1 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 69 ea 2c 92 7a 9a 95 52 e8 fe a3 |0D. .i.,.z..R...|
00000010 43 9e fe bc e1 91 5e bd d3 39 b7 ba 97 96 8a 89 |C.....^..9......|
00000020 96 a1 3b 69 02 20 70 31 02 52 cc 54 d2 26 55 eb |..;i. p1.R.T.&U.|
00000030 fa 78 2d b9 f1 f5 12 4f eb 7f a6 c3 52 8a ec c3 |.x-....O....R...|
00000040 d0 f5 b0 2a ba 73 |...*.s|
[2bc2 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2bc3 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885e50 gate 1578074141118126900 evaluation starts
[2bc4 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885e50 signed by 0 principal evaluation starts (used [false])
[2bc5 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885e50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2bc6 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885e50 principal evaluation succeeds for identity 0
[2bc7 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003885e50 gate 1578074141118126900 evaluation succeeds
[2bc8 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2bc9 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2bca 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2bcb 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2bcc 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2bcd 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes]}
[2bce 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43
[2bcf 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43
[2bd0 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2bd1 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bd2 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bd3 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bd4 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[2bd5 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bd6 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bd7 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bd8 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[2bd9 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2bda 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2bdb 01-03 17:55:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bdc 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2bdd 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2bde 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bdf 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2be0 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[2be1 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2be2 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2be3 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2be4 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2be5 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2be6 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2be7 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2be8 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 77 4e a0 1b 36 fd c5 d3 91 bc 25 95 45 56 b0 |.wN..6.....%.EV.|
00000010 60 95 92 20 8c 92 ec 77 94 9e 45 4b 17 61 e7 a2 |`.. ...w..EK.a..|
[2be9 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 07 ed 12 cc f8 11 5e c2 30 66 6c |0D. q......^.0fl|
00000010 37 86 f4 d6 9c 43 db 16 c1 2f 42 49 b1 98 32 58 |7....C.../BI..2X|
00000020 dd 52 6b e4 02 20 67 59 3b dd 1d 1e 05 cf 70 36 |.Rk.. gY;.....p6|
00000030 50 3e 88 a1 e8 89 b7 56 91 6c 67 9c 3a b7 aa 43 |P>.....V.lg.:..C|
00000040 ef 74 71 cb af f7 |.tq...|
[2bea 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2beb 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003875c80 gate 1578074141147462100 evaluation starts
[2bec 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003875c80 signed by 0 principal evaluation starts (used [false])
[2bed 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003875c80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2bee 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003875c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2bef 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003875c80 principal evaluation fails
[2bf0 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003875c80 gate 1578074141147462100 evaluation fails
[2bf1 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2bf2 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2bf3 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2bf4 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 77 4e a0 1b 36 fd c5 d3 91 bc 25 95 45 56 b0 |.wN..6.....%.EV.|
00000010 60 95 92 20 8c 92 ec 77 94 9e 45 4b 17 61 e7 a2 |`.. ...w..EK.a..|
[2bf5 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 07 ed 12 cc f8 11 5e c2 30 66 6c |0D. q......^.0fl|
00000010 37 86 f4 d6 9c 43 db 16 c1 2f 42 49 b1 98 32 58 |7....C.../BI..2X|
00000020 dd 52 6b e4 02 20 67 59 3b dd 1d 1e 05 cf 70 36 |.Rk.. gY;.....p6|
00000030 50 3e 88 a1 e8 89 b7 56 91 6c 67 9c 3a b7 aa 43 |P>.....V.lg.:..C|
00000040 ef 74 71 cb af f7 |.tq...|
[2bf6 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2bf7 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6580 gate 1578074141149700300 evaluation starts
[2bf8 01-03 17:55:41.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6580 signed by 0 principal evaluation starts (used [false])
[2bf9 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6580 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2bfa 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6580 principal evaluation succeeds for identity 0
[2bfb 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6580 gate 1578074141149700300 evaluation succeeds
[2bfc 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2bfd 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2bfe 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2bff 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2c00 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2c01 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}
[2c02 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41
[2c03 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41
[2c04 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2c05 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c06 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c07 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c08 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[2c09 01-03 17:55:41.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c0a 01-03 17:55:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c0b 01-03 17:55:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c0c 01-03 17:55:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[2c0d 01-03 17:55:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2c0e 01-03 17:55:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2c0f 01-03 17:55:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c10 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2c11 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:559355357824399530 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2c12 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[2c13 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2064184695133682557 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2c15 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[2c16 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6405916997390260036 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2c17 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2064184695133682557 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c18 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c19 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6405916997390260036 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c1a 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c14 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:559355357824399530 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c1b 01-03 17:55:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c1c 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6405916997390260036 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[2c1d 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2064184695133682557 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[2c1e 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 559355357824399530 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[2c1f 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 559355357824399530 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[2c20 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c21 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6405916997390260036 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[2c22 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6405916997390260036 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[2c23 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c24 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2064184695133682557 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[2c25 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2064184695133682557 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[2c26 01-03 17:55:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c27 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151028
[2c28 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1389921256D1F5738002A46A56BEC6A7650DAA85702F2C4A7A3A115D2221E1F8
[2c29 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2c2a 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2c2b 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c2c 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2c2d 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c2e 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2c30 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[2c2f 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2c31 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c32 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2c33 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c34 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2c35 01-03 17:55:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c36 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[2c37 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c38 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[2c39 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2c3a 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 89 92 12 56 d1 f5 73 80 02 a4 6a 56 be c6 a7 |....V..s...jV...|
00000010 65 0d aa 85 70 2f 2c 4a 7a 3a 11 5d 22 21 e1 f8 |e...p/,Jz:.]"!..|
[2c3b 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 62 9f bb a6 10 70 82 4a 5a 8d 3e |0D. 2b....p.JZ.>|
00000010 5f 5b ca 87 a3 08 b4 1c a6 29 ea 0f ce 03 86 d0 |_[.......)......|
00000020 ba 8b 7c 4d 02 20 3d 8c 95 7d b4 3e f3 33 9a 51 |..|M. =..}.>.3.Q|
00000030 ea b7 3d bf d8 17 f7 ed 70 4d c4 b5 13 40 56 b6 |..=.....pM...@V.|
00000040 e7 19 c2 7c 89 59 |...|.Y|
[2c3c 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2c3d 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 06 e4 5a 76 4b 95 d2 f4 77 f2 |0E.!....ZvK...w.|
00000010 18 a3 64 51 87 b1 23 5c 6a 94 35 a0 f7 36 3b 50 |..dQ..#\j.5..6;P|
00000020 ef 7a 5d ba a3 02 20 0c f7 d9 6e 78 68 66 1f b6 |.z]... ...nxhf..|
00000030 06 44 65 75 c7 0f 52 de a9 3d c8 27 44 68 9e 92 |.Deu..R..=.'Dh..|
00000040 ff 0c b0 82 1a 0a 8a |.......|
[2c3e 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2c3f 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2c40 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c41 01-03 17:55:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c42 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2c43 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2c44 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c45 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2c46 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[2c47 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c48 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2c4a 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2c4b 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2c4c 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2c4d 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2c4e 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2c4f 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 77 4e a0 1b 36 fd c5 d3 91 bc 25 95 45 56 b0 |.wN..6.....%.EV.|
00000010 60 95 92 20 8c 92 ec 77 94 9e 45 4b 17 61 e7 a2 |`.. ...w..EK.a..|
[2c50 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 07 ed 12 cc f8 11 5e c2 30 66 6c |0D. q......^.0fl|
00000010 37 86 f4 d6 9c 43 db 16 c1 2f 42 49 b1 98 32 58 |7....C.../BI..2X|
00000020 dd 52 6b e4 02 20 67 59 3b dd 1d 1e 05 cf 70 36 |.Rk.. gY;.....p6|
00000030 50 3e 88 a1 e8 89 b7 56 91 6c 67 9c 3a b7 aa 43 |P>.....V.lg.:..C|
00000040 ef 74 71 cb af f7 |.tq...|
[2c51 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2c52 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a9c0 gate 1578074141339360400 evaluation starts
[2c53 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a9c0 signed by 0 principal evaluation starts (used [false])
[2c54 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a9c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2c55 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2c56 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a9c0 principal evaluation fails
[2c57 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392a9c0 gate 1578074141339360400 evaluation fails
[2c58 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2c59 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2c5a 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2c5b 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 77 4e a0 1b 36 fd c5 d3 91 bc 25 95 45 56 b0 |.wN..6.....%.EV.|
00000010 60 95 92 20 8c 92 ec 77 94 9e 45 4b 17 61 e7 a2 |`.. ...w..EK.a..|
[2c5c 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 07 ed 12 cc f8 11 5e c2 30 66 6c |0D. q......^.0fl|
00000010 37 86 f4 d6 9c 43 db 16 c1 2f 42 49 b1 98 32 58 |7....C.../BI..2X|
00000020 dd 52 6b e4 02 20 67 59 3b dd 1d 1e 05 cf 70 36 |.Rk.. gY;.....p6|
00000030 50 3e 88 a1 e8 89 b7 56 91 6c 67 9c 3a b7 aa 43 |P>.....V.lg.:..C|
00000040 ef 74 71 cb af f7 |.tq...|
[2c5d 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2c5e 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b2c0 gate 1578074141339911000 evaluation starts
[2c5f 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b2c0 signed by 0 principal evaluation starts (used [false])
[2c60 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b2c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2c61 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b2c0 principal evaluation succeeds for identity 0
[2c62 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b2c0 gate 1578074141339911000 evaluation succeeds
[2c63 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2c64 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2c65 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2c66 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2c67 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2c68 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c69 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2c6a 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 89 92 12 56 d1 f5 73 80 02 a4 6a 56 be c6 a7 |....V..s...jV...|
00000010 65 0d aa 85 70 2f 2c 4a 7a 3a 11 5d 22 21 e1 f8 |e...p/,Jz:.]"!..|
[2c6b 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 62 9f bb a6 10 70 82 4a 5a 8d 3e |0D. 2b....p.JZ.>|
00000010 5f 5b ca 87 a3 08 b4 1c a6 29 ea 0f ce 03 86 d0 |_[.......)......|
00000020 ba 8b 7c 4d 02 20 3d 8c 95 7d b4 3e f3 33 9a 51 |..|M. =..}.>.3.Q|
00000030 ea b7 3d bf d8 17 f7 ed 70 4d c4 b5 13 40 56 b6 |..=.....pM...@V.|
00000040 e7 19 c2 7c 89 59 |...|.Y|
[2c6c 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2c6d 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2c6e 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c6f 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2c70 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 34 36 52 5b 29 a6 5b e0 69 5d 15 19 e5 d9 b8 |.46R[).[.i].....|
00000010 2a 4b f8 95 a4 dd 78 06 36 10 65 09 b9 4d f3 7d |*K....x.6.e..M.}|
[2c71 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 05 1c 73 43 c4 e5 56 27 c6 fb 0c |0D. M..sC..V'...|
00000010 10 80 e0 c3 7a c3 d9 75 36 2d da 5c a6 a0 1f e2 |....z..u6-.\....|
00000020 99 c7 de 2d 02 20 27 40 24 78 2b b2 5a f0 84 b7 |...-. '@$x+.Z...|
00000030 bf b1 f6 74 0a b9 21 e5 bb a6 87 4d 0b 98 b8 d0 |...t..!....M....|
00000040 91 b1 07 1d db ea |......|
[2c72 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2c73 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c74 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c49 01-03 17:55:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2c75 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2c76 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c77 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2c78 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2c79 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 34 36 52 5b 29 a6 5b e0 69 5d 15 19 e5 d9 b8 |.46R[).[.i].....|
00000010 2a 4b f8 95 a4 dd 78 06 36 10 65 09 b9 4d f3 7d |*K....x.6.e..M.}|
[2c7a 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 05 1c 73 43 c4 e5 56 27 c6 fb 0c |0D. M..sC..V'...|
00000010 10 80 e0 c3 7a c3 d9 75 36 2d da 5c a6 a0 1f e2 |....z..u6-.\....|
00000020 99 c7 de 2d 02 20 27 40 24 78 2b b2 5a f0 84 b7 |...-. '@$x+.Z...|
00000030 bf b1 f6 74 0a b9 21 e5 bb a6 87 4d 0b 98 b8 d0 |...t..!....M....|
00000040 91 b1 07 1d db ea |......|
[2c7b 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2c7c 01-03 17:55:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c7d 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2c7e 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 89 92 12 56 d1 f5 73 80 02 a4 6a 56 be c6 a7 |....V..s...jV...|
00000010 65 0d aa 85 70 2f 2c 4a 7a 3a 11 5d 22 21 e1 f8 |e...p/,Jz:.]"!..|
[2c7f 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 62 9f bb a6 10 70 82 4a 5a 8d 3e |0D. 2b....p.JZ.>|
00000010 5f 5b ca 87 a3 08 b4 1c a6 29 ea 0f ce 03 86 d0 |_[.......)......|
00000020 ba 8b 7c 4d 02 20 3d 8c 95 7d b4 3e f3 33 9a 51 |..|M. =..}.>.3.Q|
00000030 ea b7 3d bf d8 17 f7 ed 70 4d c4 b5 13 40 56 b6 |..=.....pM...@V.|
00000040 e7 19 c2 7c 89 59 |...|.Y|
[2c80 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2c81 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2c82 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c83 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2c84 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c85 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2c86 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2c87 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2c88 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2c89 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2c8a 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2c8b 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 29 87 8d f2 16 e5 fc 03 9a 9e f7 b0 c3 2b dc |.)............+.|
00000010 53 15 70 d3 cd 96 fe 37 45 6a 65 7a 0b 16 81 a4 |S.p....7Ejez....|
[2c8c 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 69 ea 2c 92 7a 9a 95 52 e8 fe a3 |0D. .i.,.z..R...|
00000010 43 9e fe bc e1 91 5e bd d3 39 b7 ba 97 96 8a 89 |C.....^..9......|
00000020 96 a1 3b 69 02 20 70 31 02 52 cc 54 d2 26 55 eb |..;i. p1.R.T.&U.|
00000030 fa 78 2d b9 f1 f5 12 4f eb 7f a6 c3 52 8a ec c3 |.x-....O....R...|
00000040 d0 f5 b0 2a ba 73 |...*.s|
[2c8d 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2c8e 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989400 gate 1578074141353594500 evaluation starts
[2c8f 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989400 signed by 0 principal evaluation starts (used [false])
[2c90 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989400 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2c91 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2c92 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989400 principal evaluation fails
[2c93 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989400 gate 1578074141353594500 evaluation fails
[2c94 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2c95 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2c96 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2c97 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 29 87 8d f2 16 e5 fc 03 9a 9e f7 b0 c3 2b dc |.)............+.|
00000010 53 15 70 d3 cd 96 fe 37 45 6a 65 7a 0b 16 81 a4 |S.p....7Ejez....|
[2c98 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 69 ea 2c 92 7a 9a 95 52 e8 fe a3 |0D. .i.,.z..R...|
00000010 43 9e fe bc e1 91 5e bd d3 39 b7 ba 97 96 8a 89 |C.....^..9......|
00000020 96 a1 3b 69 02 20 70 31 02 52 cc 54 d2 26 55 eb |..;i. p1.R.T.&U.|
00000030 fa 78 2d b9 f1 f5 12 4f eb 7f a6 c3 52 8a ec c3 |.x-....O....R...|
00000040 d0 f5 b0 2a ba 73 |...*.s|
[2c99 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2c9a 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989d00 gate 1578074141355701900 evaluation starts
[2c9b 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989d00 signed by 0 principal evaluation starts (used [false])
[2c9c 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989d00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2c9d 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989d00 principal evaluation succeeds for identity 0
[2c9e 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989d00 gate 1578074141355701900 evaluation succeeds
[2c9f 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2ca0 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2ca1 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ca2 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ca3 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2ca4 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ca5 01-03 17:55:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ca6 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ca7 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ca8 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[2ca9 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2caa 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cac 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2cad 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cab 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2cae 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2caf 01-03 17:55:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2cb0 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2cb1 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cb2 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cb3 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cb4 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2cb5 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2cb6 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2cb7 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2cb8 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2cb9 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2cba 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2cbb 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2cbc 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2cbd 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bc200 gate 1578074141484721600 evaluation starts
[2cbe 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bc200 signed by 0 principal evaluation starts (used [false])
[2cbf 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bc200 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2cc0 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bc200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2cc1 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bc200 principal evaluation fails
[2cc2 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bc200 gate 1578074141484721600 evaluation fails
[2cc3 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2cc4 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2cc5 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2cc6 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2cc8 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2cc7 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2cc9 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2cca 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bcb00 gate 1578074141489078800 evaluation starts
[2ccb 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bcb00 signed by 0 principal evaluation starts (used [false])
[2ccc 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bcb00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2ccd 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bcb00 principal evaluation succeeds for identity 0
[2cce 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bcb00 gate 1578074141489078800 evaluation succeeds
[2ccf 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2cd0 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2cd1 01-03 17:55:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2cd2 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2cd3 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2cd4 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2cd5 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cd6 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cd7 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2cd8 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2cd9 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2cda 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2cdb 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2cdc 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2cdd 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2cde 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2cdf 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2ce0 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d8c10 gate 1578074141492489100 evaluation starts
[2ce1 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d8c10 signed by 0 principal evaluation starts (used [false])
[2ce2 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d8c10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2ce3 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d8c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2ce4 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d8c10 principal evaluation fails
[2ce5 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d8c10 gate 1578074141492489100 evaluation fails
[2ce6 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2ce7 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2ce8 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2ce9 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2cea 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2ceb 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2cec 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d9510 gate 1578074141496413500 evaluation starts
[2ced 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d9510 signed by 0 principal evaluation starts (used [false])
[2cee 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d9510 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2cef 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d9510 principal evaluation succeeds for identity 0
[2cf0 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d9510 gate 1578074141496413500 evaluation succeeds
[2cf1 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2cf2 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2cf3 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2cf4 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2cf5 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2cf6 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2cf7 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cf8 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2cf9 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2cfa 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2cfb 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2cfc 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2cfd 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cfe 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cff 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2d00 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2d01 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2d02 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2d03 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2d04 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2d05 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2d06 01-03 17:55:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2d07 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d08 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a560 gate 1578074141500156200 evaluation starts
[2d09 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a560 signed by 0 principal evaluation starts (used [false])
[2d0a 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a560 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2d0b 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2d0c 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a560 principal evaluation fails
[2d0d 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2a560 gate 1578074141500156200 evaluation fails
[2d0e 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2d0f 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2d10 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2d11 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2d12 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2d13 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d14 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2ae60 gate 1578074141502557500 evaluation starts
[2d15 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2ae60 signed by 0 principal evaluation starts (used [false])
[2d16 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2ae60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2d17 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2ae60 principal evaluation succeeds for identity 0
[2d18 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2ae60 gate 1578074141502557500 evaluation succeeds
[2d19 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2d1a 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2d1b 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2d1c 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2d1d 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d1e 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d1f 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2d20 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2d21 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2d22 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2d23 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2d24 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2d25 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2d26 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2d27 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d28 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a408c0 gate 1578074141507631200 evaluation starts
[2d29 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a408c0 signed by 0 principal evaluation starts (used [false])
[2d2a 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a408c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2d2b 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a408c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2d2c 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a408c0 principal evaluation fails
[2d2d 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a408c0 gate 1578074141507631200 evaluation fails
[2d2e 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2d2f 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2d30 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2d31 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2d32 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2d33 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d34 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a411c0 gate 1578074141509528900 evaluation starts
[2d35 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a411c0 signed by 0 principal evaluation starts (used [false])
[2d36 01-03 17:55:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a411c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2d37 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a411c0 principal evaluation succeeds for identity 0
[2d38 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a411c0 gate 1578074141509528900 evaluation succeeds
[2d39 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2d3a 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2d3b 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2d3c 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[2d3d 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[2d3e 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315100C1801
[2d3f 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A7E7B5FEDC31C95E2B94AB8AA7CCEFB7E3896DE1D484442A4838D65F3A88F7B2
[2d40 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[2d41 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2d42 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d43 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2d44 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d45 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d46 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d47 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2d48 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2d49 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2d4a 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2d4b 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2d4c 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2d4d 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2d4e 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2d4f 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d50 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62ed0 gate 1578074141514489000 evaluation starts
[2d51 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62ed0 signed by 0 principal evaluation starts (used [false])
[2d52 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62ed0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2d53 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2d54 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62ed0 principal evaluation fails
[2d55 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62ed0 gate 1578074141514489000 evaluation fails
[2d56 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2d57 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2d58 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2d59 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2d5a 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2d5b 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d5c 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a637d0 gate 1578074141516804200 evaluation starts
[2d5d 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a637d0 signed by 0 principal evaluation starts (used [false])
[2d5e 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a637d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2d60 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a637d0 principal evaluation succeeds for identity 0
[2d61 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a637d0 gate 1578074141516804200 evaluation succeeds
[2d62 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2d63 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2d5f 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d64 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2d66 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2d65 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d67 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2d68 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2d69 01-03 17:55:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d6a 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d6b 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[2d6c 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2d6d 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2d6f 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[2d70 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d71 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d72 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d6e 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d73 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d74 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2d75 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2d76 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2d77 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2d78 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2d79 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2d7a 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2d7b 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2d7c 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d7d 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab6890 gate 1578074141525358500 evaluation starts
[2d7e 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab6890 signed by 0 principal evaluation starts (used [false])
[2d7f 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab6890 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2d80 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab6890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2d81 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab6890 principal evaluation fails
[2d82 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab6890 gate 1578074141525358500 evaluation fails
[2d83 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2d84 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2d85 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2d86 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2d87 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2d88 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d89 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab7190 gate 1578074141528499000 evaluation starts
[2d8a 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab7190 signed by 0 principal evaluation starts (used [false])
[2d8b 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab7190 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2d8c 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab7190 principal evaluation succeeds for identity 0
[2d8d 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab7190 gate 1578074141528499000 evaluation succeeds
[2d8e 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2d8f 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2d90 01-03 17:55:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2d91 01-03 17:55:41.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2d92 01-03 17:55:41.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d93 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d94 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d95 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[2d96 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d97 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d98 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2715376554502566904 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[2d99 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2715376554502566904 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2d9a 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d9b 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2715376554502566904 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[2d9c 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2715376554502566904 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[2d9d 01-03 17:55:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d9e 01-03 17:55:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[2d9f 01-03 17:55:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2da0 01-03 17:55:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2da1 01-03 17:55:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2da2 01-03 17:55:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15623608527795274019 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2da3 01-03 17:55:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15623608527795274019 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2da4 01-03 17:55:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2da5 01-03 17:55:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2da6 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2da7 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2da8 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2da9 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2daa 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 20 3c 88 50 4c 91 65 c4 be 35 42 e7 89 60 c6 |. <.PL.e..5B..`.|
00000010 ef 19 3a f1 97 f9 a8 7e 51 c1 f8 7d df e1 6f 62 |..:....~Q..}..ob|
[2dab 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 0f 31 ed d7 c0 b5 4f c4 e1 ed 7d |0D. }.1....O...}|
00000010 4b 47 99 f4 93 33 8a 1b 51 cd 35 89 56 97 1b 5c |KG...3..Q.5.V..\|
00000020 f1 9e 71 fb 02 20 10 51 85 2c 15 bd cf b5 60 ee |..q.. .Q.,....`.|
00000030 8b f6 91 32 86 d4 c6 39 8b d1 6e ea f4 85 c0 cd |...2...9..n.....|
00000040 54 33 c2 91 d8 8f |T3....|
[2dac 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2dad 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 22 4d 0e 9b f0 2c 62 d0 a1 8e e3 |0D. <"M...,b....|
00000010 33 20 24 10 18 f0 59 5a 3b fe 2a 22 f0 70 98 f5 |3 $...YZ;.*".p..|
00000020 9a f4 81 dd 02 20 4a 6b 1f 20 1c df fe e5 49 45 |..... Jk. ....IE|
00000030 43 af 41 f3 66 d8 d7 69 9e 8c 0b f5 4b c7 4a 8b |C.A.f..i....K.J.|
00000040 5d d4 4b cd 35 b3 |].K.5.|
[2dae 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2daf 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[2db0 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44
[2db1 01-03 17:55:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44
[2db2 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[2db3 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2db4 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2db5 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2db6 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2db7 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2db8 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2db9 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2dba 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dbb 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2dbc 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2dbe 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dbd 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2dbf 01-03 17:55:41.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dc0 01-03 17:55:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2dc1 01-03 17:55:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2dc2 01-03 17:55:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dc3 01-03 17:55:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2dc4 01-03 17:55:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dc5 01-03 17:55:41.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2dc6 01-03 17:55:41.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2dc7 01-03 17:55:41.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dc8 01-03 17:55:41.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2dc9 01-03 17:55:41.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dca 01-03 17:55:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2dcb 01-03 17:55:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[2dcc 01-03 17:55:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dcd 01-03 17:55:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dce 01-03 17:55:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dcf 01-03 17:55:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dd0 01-03 17:55:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[2dd1 01-03 17:55:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[2dd2 01-03 17:55:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dd3 01-03 17:55:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dd4 01-03 17:55:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dd5 01-03 17:55:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dd6 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2dd7 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2dd8 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dd9 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2dda 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[2ddb 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ddc 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2ddd 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2dde 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2ddf 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2de0 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2de1 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2de2 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 29 b4 77 d1 ac 4e d0 1a d5 dc cc fc d7 49 71 |.).w..N.......Iq|
00000010 63 29 e0 85 50 21 7a cd 87 74 13 84 a1 5f 54 88 |c)..P!z..t..._T.|
[2de3 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 f9 f5 50 3d f6 4b 3b 03 2a 94 |0E.!....P=.K;.*.|
00000010 c1 ba c0 94 26 52 b0 4a 92 1b 05 92 aa 73 5e a4 |....&R.J.....s^.|
00000020 8a e2 c8 54 24 02 20 5e fc 24 90 4b f1 94 7b 76 |...T$. ^.$.K..{v|
00000030 3b 4a 26 d3 6d 39 96 f1 7b 02 8f bb 63 7b 83 ad |;J&.m9..{...c{..|
00000040 84 2a 08 fa a2 2b bc |.*...+.|
[2de4 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2de5 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8790 gate 1578074143029217900 evaluation starts
[2de6 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8790 signed by 0 principal evaluation starts (used [false])
[2de7 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8790 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2de8 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2de9 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8790 principal evaluation fails
[2dea 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8790 gate 1578074143029217900 evaluation fails
[2deb 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2dec 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2ded 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2dee 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 29 b4 77 d1 ac 4e d0 1a d5 dc cc fc d7 49 71 |.).w..N.......Iq|
00000010 63 29 e0 85 50 21 7a cd 87 74 13 84 a1 5f 54 88 |c)..P!z..t..._T.|
[2def 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 f9 f5 50 3d f6 4b 3b 03 2a 94 |0E.!....P=.K;.*.|
00000010 c1 ba c0 94 26 52 b0 4a 92 1b 05 92 aa 73 5e a4 |....&R.J.....s^.|
00000020 8a e2 c8 54 24 02 20 5e fc 24 90 4b f1 94 7b 76 |...T$. ^.$.K..{v|
00000030 3b 4a 26 d3 6d 39 96 f1 7b 02 8f bb 63 7b 83 ad |;J&.m9..{...c{..|
00000040 84 2a 08 fa a2 2b bc |.*...+.|
[2df0 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2df1 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9090 gate 1578074143029906900 evaluation starts
[2df2 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9090 signed by 0 principal evaluation starts (used [false])
[2df3 01-03 17:55:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9090 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2df4 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9090 principal evaluation succeeds for identity 0
[2df5 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9090 gate 1578074143029906900 evaluation succeeds
[2df6 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2df7 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2df8 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2df9 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2dfa 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2dfb 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes]}
[2dfc 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42
[2dfd 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42
[2dfe 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2dff 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e00 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e01 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e02 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e03 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e04 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e05 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e06 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e07 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e08 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e09 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2e0a 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e0c 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2e0d 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2e0e 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e0b 01-03 17:55:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2e0f 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e10 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2e11 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e12 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2e13 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e14 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2e15 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2e16 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e17 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2e18 01-03 17:55:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e19 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e1a 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e1b 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e1c 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e1d 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2e1e 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e1f 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2e20 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2e21 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2e22 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2e23 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2e24 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2e25 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab cf 74 d0 99 51 6e 14 76 ea e7 1d a9 49 12 03 |..t..Qn.v....I..|
00000010 41 b2 e2 1b 14 33 62 d4 a5 de a8 51 51 53 01 14 |A....3b....QQS..|
[2e26 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 51 ef c1 eb c8 42 99 70 e4 4b |0E.!..Q....B.p.K|
00000010 bb 09 0a a4 67 d3 fb 41 9b aa ef 90 e1 b0 df 88 |....g..A........|
00000020 c9 d0 94 fb 60 02 20 7d 43 41 f1 d0 74 05 85 50 |....`. }CA..t..P|
00000030 af 88 1b 50 c1 a3 5f 35 28 d3 19 94 d2 03 fe 7a |...P.._5(......z|
00000040 a7 a6 6f 8f ea 04 41 |..o...A|
[2e27 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2e28 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470c5a0 gate 1578074143095799900 evaluation starts
[2e29 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470c5a0 signed by 0 principal evaluation starts (used [false])
[2e2a 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470c5a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2e2b 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470c5a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2e2c 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470c5a0 principal evaluation fails
[2e2d 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470c5a0 gate 1578074143095799900 evaluation fails
[2e2e 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2e2f 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2e30 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2e31 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab cf 74 d0 99 51 6e 14 76 ea e7 1d a9 49 12 03 |..t..Qn.v....I..|
00000010 41 b2 e2 1b 14 33 62 d4 a5 de a8 51 51 53 01 14 |A....3b....QQS..|
[2e32 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 51 ef c1 eb c8 42 99 70 e4 4b |0E.!..Q....B.p.K|
00000010 bb 09 0a a4 67 d3 fb 41 9b aa ef 90 e1 b0 df 88 |....g..A........|
00000020 c9 d0 94 fb 60 02 20 7d 43 41 f1 d0 74 05 85 50 |....`. }CA..t..P|
00000030 af 88 1b 50 c1 a3 5f 35 28 d3 19 94 d2 03 fe 7a |...P.._5(......z|
00000040 a7 a6 6f 8f ea 04 41 |..o...A|
[2e33 01-03 17:55:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2e34 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470cea0 gate 1578074143100523100 evaluation starts
[2e35 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470cea0 signed by 0 principal evaluation starts (used [false])
[2e36 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470cea0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2e37 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470cea0 principal evaluation succeeds for identity 0
[2e38 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470cea0 gate 1578074143100523100 evaluation succeeds
[2e39 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2e3a 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2e3b 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2e3c 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2e3d 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e3e 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes]}
[2e3f 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44
[2e40 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44
[2e41 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2e42 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e43 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e44 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e45 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e46 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e47 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e48 01-03 17:55:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e49 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e4a 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e4b 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e4c 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e4d 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e4e 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e4f 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e50 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e51 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e52 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e53 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e54 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e55 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2e56 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e57 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e59 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e58 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2e5a 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2e5b 01-03 17:55:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e5c 01-03 17:55:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151029
[2e5d 01-03 17:55:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 464E3B9D2A98D1E7932C284169048593DA5F5B3989B188EF888C845367FBE056
[2e5e 01-03 17:55:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2e5f 01-03 17:55:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2e60 01-03 17:55:43.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2e61 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e62 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e63 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e64 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2e65 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e66 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2e67 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[2e69 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2e6b 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e6a 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2e6c 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e68 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2e6d 01-03 17:55:43.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e6e 01-03 17:55:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:2356403296759463007 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2e6f 01-03 17:55:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:2356403296759463007 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2e70 01-03 17:55:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2e71 01-03 17:55:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e72 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[2e73 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e74 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[2e75 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2e76 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 09 27 a1 46 86 c0 eb d2 aa 89 41 86 cb 3b 31 |..'.F......A..;1|
00000010 17 0c 0a 9e 0f bd 68 9e 90 70 f9 02 22 78 2f 4f |......h..p.."x/O|
[2e77 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 25 9d 33 6b 00 00 3d 45 dc 9b |0E.!..%.3k..=E..|
00000010 ab 93 75 08 81 4d 22 fe 89 b1 6e 36 8f 10 10 e5 |..u..M"...n6....|
00000020 e9 79 76 f3 56 02 20 65 10 11 cf 05 7f ed 25 8b |.yv.V. e......%.|
00000030 f8 85 a3 ee e3 86 58 6d 58 2e 8c ee 01 2a 80 88 |......XmX....*..|
00000040 bb c1 71 fb 7f 4c e3 |..q..L.|
[2e78 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2e79 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 40 3d fa 12 48 51 1b 91 4f 47 |0E.!..@=..HQ..OG|
00000010 49 86 63 6d 91 b5 1c 35 22 7e c3 b5 34 77 f8 1c |I.cm...5"~..4w..|
00000020 9d 3e 31 29 0c 02 20 0c e6 bd 25 7f ea 65 51 59 |.>1).. ...%..eQY|
00000030 5c 2e f2 b4 a5 9d 5a 1a 0a 30 56 56 b2 f9 c8 df |\.....Z..0VV....|
00000040 a2 ee 8b 75 a6 03 a2 |...u...|
[2e7a 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2e7b 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[2e7c 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45
[2e7d 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45
[2e7e 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[2e7f 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e80 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e81 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e82 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[2e83 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e84 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e85 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[2e86 01-03 17:55:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[2e87 01-03 17:55:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[2e88 01-03 17:55:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e89 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:17399070943887670326 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2e8a 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:17399070943887670326 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2e8b 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17399070943887670326 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2e8c 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e8d 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e8e 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e8f 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e90 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e91 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e92 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[2e93 01-03 17:55:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e94 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:12424214886662495870 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2e95 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:12424214886662495870 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2e96 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12424214886662495870 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2e97 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e98 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e99 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e9a 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e9b 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e9c 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e9d 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[2e9e 01-03 17:55:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e9f 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2ea0 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2ea1 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ea2 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2ea3 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2ea4 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ea5 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2ea6 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2ea7 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2ea8 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2ea9 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2eaa 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2eab 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 71 26 01 81 a3 6a d1 27 b9 04 fe 0c 7d 3f 43 |.q&...j.'....}?C|
00000010 8a 4f b5 36 d4 91 64 b5 ff a4 12 c6 60 30 a5 cd |.O.6..d.....`0..|
[2eac 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 9e 1e 08 d6 35 4b 3f e9 b0 66 |0E.!......5K?..f|
00000010 4f 63 a5 d5 db 63 0e 6f fb e7 5e 26 95 da f5 4a |Oc...c.o..^&...J|
00000020 8f 7a 46 ee 41 02 20 56 83 28 b7 55 4b 06 ff 29 |.zF.A. V.(.UK..)|
00000030 67 a0 04 d3 a2 f9 ed 2f 34 4c 1e b8 06 e8 02 cc |g....../4L......|
00000040 6b 60 6c 6f 92 53 0d |k`lo.S.|
[2ead 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2eae 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478b220 gate 1578074145112408500 evaluation starts
[2eaf 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478b220 signed by 0 principal evaluation starts (used [false])
[2eb0 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478b220 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2eb1 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478b220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2eb2 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478b220 principal evaluation fails
[2eb3 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478b220 gate 1578074145112408500 evaluation fails
[2eb4 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2eb5 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2eb6 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2eb7 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 71 26 01 81 a3 6a d1 27 b9 04 fe 0c 7d 3f 43 |.q&...j.'....}?C|
00000010 8a 4f b5 36 d4 91 64 b5 ff a4 12 c6 60 30 a5 cd |.O.6..d.....`0..|
[2eb8 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 9e 1e 08 d6 35 4b 3f e9 b0 66 |0E.!......5K?..f|
00000010 4f 63 a5 d5 db 63 0e 6f fb e7 5e 26 95 da f5 4a |Oc...c.o..^&...J|
00000020 8f 7a 46 ee 41 02 20 56 83 28 b7 55 4b 06 ff 29 |.zF.A. V.(.UK..)|
00000030 67 a0 04 d3 a2 f9 ed 2f 34 4c 1e b8 06 e8 02 cc |g....../4L......|
00000040 6b 60 6c 6f 92 53 0d |k`lo.S.|
[2eb9 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2eba 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478bb20 gate 1578074145112856600 evaluation starts
[2ebb 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478bb20 signed by 0 principal evaluation starts (used [false])
[2ebc 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478bb20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2ebd 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478bb20 principal evaluation succeeds for identity 0
[2ebe 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478bb20 gate 1578074145112856600 evaluation succeeds
[2ebf 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2ec0 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2ec1 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ec2 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ec3 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2ec4 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes]}
[2ec5 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45
[2ec6 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45
[2ec7 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2ec8 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ec9 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2eca 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ecb 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[2ecc 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ecd 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ece 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ecf 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[2ed0 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2ed1 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2ed2 01-03 17:55:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ed3 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2ed4 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2ed5 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ed6 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2ed7 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[2ed8 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ed9 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2eda 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2edb 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2edc 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2edd 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2ede 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2edf 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 54 36 6c 10 b4 75 06 39 1d 12 df c9 f1 07 2b |.T6l..u.9......+|
00000010 a9 f7 c3 42 cf 31 6c 1c 0e 9b 4a 8e e3 55 37 84 |...B.1l...J..U7.|
[2ee0 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 27 23 39 b1 73 d8 06 6e 4f b4 |0E.!..'#9.s..nO.|
00000010 3e ce 27 94 9a cc aa d4 d1 cd 91 36 b4 1f 2e e6 |>.'........6....|
00000020 ac 3d e0 56 11 02 20 3e 35 5d 67 83 3d 1b b6 a6 |.=.V.. >5]g.=...|
00000030 15 5d 5e 9c e5 e8 0d 0d ca 44 4d ca 4c b2 e0 90 |.]^......DM.L...|
00000040 13 97 e4 ab 63 04 db |....c..|
[2ee1 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2ee2 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eecb30 gate 1578074145142168900 evaluation starts
[2ee3 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eecb30 signed by 0 principal evaluation starts (used [false])
[2ee4 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eecb30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2ee5 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eecb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2ee6 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eecb30 principal evaluation fails
[2ee7 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eecb30 gate 1578074145142168900 evaluation fails
[2ee8 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2ee9 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2eea 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2eeb 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 54 36 6c 10 b4 75 06 39 1d 12 df c9 f1 07 2b |.T6l..u.9......+|
00000010 a9 f7 c3 42 cf 31 6c 1c 0e 9b 4a 8e e3 55 37 84 |...B.1l...J..U7.|
[2eec 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 27 23 39 b1 73 d8 06 6e 4f b4 |0E.!..'#9.s..nO.|
00000010 3e ce 27 94 9a cc aa d4 d1 cd 91 36 b4 1f 2e e6 |>.'........6....|
00000020 ac 3d e0 56 11 02 20 3e 35 5d 67 83 3d 1b b6 a6 |.=.V.. >5]g.=...|
00000030 15 5d 5e 9c e5 e8 0d 0d ca 44 4d ca 4c b2 e0 90 |.]^......DM.L...|
00000040 13 97 e4 ab 63 04 db |....c..|
[2eed 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2eee 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eed430 gate 1578074145143479900 evaluation starts
[2eef 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eed430 signed by 0 principal evaluation starts (used [false])
[2ef0 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eed430 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2ef1 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eed430 principal evaluation succeeds for identity 0
[2ef2 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eed430 gate 1578074145143479900 evaluation succeeds
[2ef3 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2ef4 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2ef5 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ef6 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ef7 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[2ef8 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes]}
[2ef9 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43
[2efa 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43
[2efb 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2efc 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2efd 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2efe 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2eff 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[2f00 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f01 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f02 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f03 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[2f04 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2f05 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2f06 01-03 17:55:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f07 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[2f08 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13843925950290265898 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2f09 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2f0a 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1864348704487670095 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2f0b 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[2f0c 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13006948252848069500 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2f0d 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13006948252848069500 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2f0e 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f0f 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13843925950290265898 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2f10 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f11 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1864348704487670095 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2f12 01-03 17:55:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f13 01-03 17:55:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13006948252848069500 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2f14 01-03 17:55:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13006948252848069500 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2f15 01-03 17:55:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13006948252848069500 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2f16 01-03 17:55:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f17 01-03 17:55:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1864348704487670095 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[2f18 01-03 17:55:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1864348704487670095 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[2f19 01-03 17:55:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f1a 01-03 17:55:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13843925950290265898 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2f1b 01-03 17:55:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13843925950290265898 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2f1c 01-03 17:55:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13843925950290265898 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[2f1d 01-03 17:55:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f1e 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315102A
[2f1f 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AA0680464FB0C701F7D2127DC576C516B76F60757B8586E4A25CBF8BE6EFDBE2
[2f20 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2f21 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2f22 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f23 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2f24 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f25 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2f26 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[2f27 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[2f28 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f29 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2f2a 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f2b 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2f2c 01-03 17:55:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f2d 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2f2e 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2f2f 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f30 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2f31 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[2f32 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f33 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2f34 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2f35 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2f36 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2f37 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2f38 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2f39 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 54 36 6c 10 b4 75 06 39 1d 12 df c9 f1 07 2b |.T6l..u.9......+|
00000010 a9 f7 c3 42 cf 31 6c 1c 0e 9b 4a 8e e3 55 37 84 |...B.1l...J..U7.|
[2f3a 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 27 23 39 b1 73 d8 06 6e 4f b4 |0E.!..'#9.s..nO.|
00000010 3e ce 27 94 9a cc aa d4 d1 cd 91 36 b4 1f 2e e6 |>.'........6....|
00000020 ac 3d e0 56 11 02 20 3e 35 5d 67 83 3d 1b b6 a6 |.=.V.. >5]g.=...|
00000030 15 5d 5e 9c e5 e8 0d 0d ca 44 4d ca 4c b2 e0 90 |.]^......DM.L...|
00000040 13 97 e4 ab 63 04 db |....c..|
[2f3b 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2f3c 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a5ab0 gate 1578074145338871600 evaluation starts
[2f3d 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a5ab0 signed by 0 principal evaluation starts (used [false])
[2f3e 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a5ab0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2f3f 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a5ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2f40 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a5ab0 principal evaluation fails
[2f41 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a5ab0 gate 1578074145338871600 evaluation fails
[2f42 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2f43 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2f44 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2f45 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 54 36 6c 10 b4 75 06 39 1d 12 df c9 f1 07 2b |.T6l..u.9......+|
00000010 a9 f7 c3 42 cf 31 6c 1c 0e 9b 4a 8e e3 55 37 84 |...B.1l...J..U7.|
[2f46 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 27 23 39 b1 73 d8 06 6e 4f b4 |0E.!..'#9.s..nO.|
00000010 3e ce 27 94 9a cc aa d4 d1 cd 91 36 b4 1f 2e e6 |>.'........6....|
00000020 ac 3d e0 56 11 02 20 3e 35 5d 67 83 3d 1b b6 a6 |.=.V.. >5]g.=...|
00000030 15 5d 5e 9c e5 e8 0d 0d ca 44 4d ca 4c b2 e0 90 |.]^......DM.L...|
00000040 13 97 e4 ab 63 04 db |....c..|
[2f47 01-03 17:55:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2f48 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b83b0 gate 1578074145340280500 evaluation starts
[2f49 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b83b0 signed by 0 principal evaluation starts (used [false])
[2f4a 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b83b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2f4b 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b83b0 principal evaluation succeeds for identity 0
[2f4c 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b83b0 gate 1578074145340280500 evaluation succeeds
[2f4d 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2f4e 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2f4f 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2f50 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2f51 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[2f52 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f53 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2f54 01-03 17:55:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 80 46 4f b0 c7 01 f7 d2 12 7d c5 76 c5 16 |...FO......}.v..|
00000010 b7 6f 60 75 7b 85 86 e4 a2 5c bf 8b e6 ef db e2 |.o`u{....\......|
[2f55 01-03 17:55:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2f56 01-03 17:55:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2f57 01-03 17:55:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 09 e5 05 b8 eb e8 ff 64 04 3b 1b |0D. v.......d.;.|
00000010 7d cd 54 22 15 55 53 a9 88 25 66 19 42 55 03 0b |}.T".US..%f.BU..|
00000020 74 c3 eb fc 02 20 69 7d 08 e6 1a bc 15 78 62 fc |t.... i}.....xb.|
00000030 2a 55 7a ee 95 97 7a fa 90 93 ed b7 2a 87 27 80 |*Uz...z.....*.'.|
00000040 32 34 9a f3 96 b0 |24....|
[2f58 01-03 17:55:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2f59 01-03 17:55:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2f5a 01-03 17:55:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f5b 01-03 17:55:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2f5c 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 09 27 a1 46 86 c0 eb d2 aa 89 41 86 cb 3b 31 |..'.F......A..;1|
00000010 17 0c 0a 9e 0f bd 68 9e 90 70 f9 02 22 78 2f 4f |......h..p.."x/O|
[2f5d 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 25 9d 33 6b 00 00 3d 45 dc 9b |0E.!..%.3k..=E..|
00000010 ab 93 75 08 81 4d 22 fe 89 b1 6e 36 8f 10 10 e5 |..u..M"...n6....|
00000020 e9 79 76 f3 56 02 20 65 10 11 cf 05 7f ed 25 8b |.yv.V. e......%.|
00000030 f8 85 a3 ee e3 86 58 6d 58 2e 8c ee 01 2a 80 88 |......XmX....*..|
00000040 bb c1 71 fb 7f 4c e3 |..q..L.|
[2f5e 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2f5f 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f60 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f61 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2f62 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[2f63 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f64 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f65 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2f66 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2f67 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2f68 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2f69 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2f6a 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2f6b 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 71 26 01 81 a3 6a d1 27 b9 04 fe 0c 7d 3f 43 |.q&...j.'....}?C|
00000010 8a 4f b5 36 d4 91 64 b5 ff a4 12 c6 60 30 a5 cd |.O.6..d.....`0..|
[2f6c 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 9e 1e 08 d6 35 4b 3f e9 b0 66 |0E.!......5K?..f|
00000010 4f 63 a5 d5 db 63 0e 6f fb e7 5e 26 95 da f5 4a |Oc...c.o..^&...J|
00000020 8f 7a 46 ee 41 02 20 56 83 28 b7 55 4b 06 ff 29 |.zF.A. V.(.UK..)|
00000030 67 a0 04 d3 a2 f9 ed 2f 34 4c 1e b8 06 e8 02 cc |g....../4L......|
00000040 6b 60 6c 6f 92 53 0d |k`lo.S.|
[2f6d 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2f6e 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7610 gate 1578074145375460300 evaluation starts
[2f6f 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7610 signed by 0 principal evaluation starts (used [false])
[2f70 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7610 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2f71 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2f72 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7610 principal evaluation fails
[2f73 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7610 gate 1578074145375460300 evaluation fails
[2f74 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2f75 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2f76 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2f77 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 71 26 01 81 a3 6a d1 27 b9 04 fe 0c 7d 3f 43 |.q&...j.'....}?C|
00000010 8a 4f b5 36 d4 91 64 b5 ff a4 12 c6 60 30 a5 cd |.O.6..d.....`0..|
[2f78 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 9e 1e 08 d6 35 4b 3f e9 b0 66 |0E.!......5K?..f|
00000010 4f 63 a5 d5 db 63 0e 6f fb e7 5e 26 95 da f5 4a |Oc...c.o..^&...J|
00000020 8f 7a 46 ee 41 02 20 56 83 28 b7 55 4b 06 ff 29 |.zF.A. V.(.UK..)|
00000030 67 a0 04 d3 a2 f9 ed 2f 34 4c 1e b8 06 e8 02 cc |g....../4L......|
00000040 6b 60 6c 6f 92 53 0d |k`lo.S.|
[2f79 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2f7a 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7f10 gate 1578074145378707800 evaluation starts
[2f7b 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7f10 signed by 0 principal evaluation starts (used [false])
[2f7c 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7f10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2f7d 01-03 17:55:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7f10 principal evaluation succeeds for identity 0
[2f7e 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d7f10 gate 1578074145378707800 evaluation succeeds
[2f7f 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2f80 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2f81 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2f82 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2f83 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2f84 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f85 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[2f86 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 09 27 a1 46 86 c0 eb d2 aa 89 41 86 cb 3b 31 |..'.F......A..;1|
00000010 17 0c 0a 9e 0f bd 68 9e 90 70 f9 02 22 78 2f 4f |......h..p.."x/O|
[2f87 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 25 9d 33 6b 00 00 3d 45 dc 9b |0E.!..%.3k..=E..|
00000010 ab 93 75 08 81 4d 22 fe 89 b1 6e 36 8f 10 10 e5 |..u..M"...n6....|
00000020 e9 79 76 f3 56 02 20 65 10 11 cf 05 7f ed 25 8b |.yv.V. e......%.|
00000030 f8 85 a3 ee e3 86 58 6d 58 2e 8c ee 01 2a 80 88 |......XmX....*..|
00000040 bb c1 71 fb 7f 4c e3 |..q..L.|
[2f88 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2f89 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f8a 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2f8b 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 80 46 4f b0 c7 01 f7 d2 12 7d c5 76 c5 16 |...FO......}.v..|
00000010 b7 6f 60 75 7b 85 86 e4 a2 5c bf 8b e6 ef db e2 |.o`u{....\......|
[2f8c 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 09 e5 05 b8 eb e8 ff 64 04 3b 1b |0D. v.......d.;.|
00000010 7d cd 54 22 15 55 53 a9 88 25 66 19 42 55 03 0b |}.T".US..%f.BU..|
00000020 74 c3 eb fc 02 20 69 7d 08 e6 1a bc 15 78 62 fc |t.... i}.....xb.|
00000030 2a 55 7a ee 95 97 7a fa 90 93 ed b7 2a 87 27 80 |*Uz...z.....*.'.|
00000040 32 34 9a f3 96 b0 |24....|
[2f8d 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2f8e 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2f8f 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f90 01-03 17:55:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f91 01-03 17:55:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[2f92 01-03 17:55:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f93 01-03 17:55:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[2f94 01-03 17:55:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[2f95 01-03 17:55:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 06 80 46 4f b0 c7 01 f7 d2 12 7d c5 76 c5 16 |...FO......}.v..|
00000010 b7 6f 60 75 7b 85 86 e4 a2 5c bf 8b e6 ef db e2 |.o`u{....\......|
[2f96 01-03 17:55:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 09 e5 05 b8 eb e8 ff 64 04 3b 1b |0D. v.......d.;.|
00000010 7d cd 54 22 15 55 53 a9 88 25 66 19 42 55 03 0b |}.T".US..%f.BU..|
00000020 74 c3 eb fc 02 20 69 7d 08 e6 1a bc 15 78 62 fc |t.... i}.....xb.|
00000030 2a 55 7a ee 95 97 7a fa 90 93 ed b7 2a 87 27 80 |*Uz...z.....*.'.|
00000040 32 34 9a f3 96 b0 |24....|
[2f97 01-03 17:55:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2f98 01-03 17:55:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 69 82 b6 d1 da 4b f7 22 7b d6 63 |0D. Oi....K."{.c|
00000010 48 3b e2 a9 21 37 9a d2 79 a4 37 34 29 18 b3 64 |H;..!7..y.74)..d|
00000020 08 ae 6a 5c 02 20 4f 43 5b 4d 8e 49 27 4e 15 15 |..j\. OC[M.I'N..|
00000030 33 52 72 3e b3 af 35 d0 6c c7 25 16 62 70 ac c9 |3Rr>..5.l.%.bp..|
00000040 c3 2f c5 48 ad c4 |./.H..|
[2f99 01-03 17:55:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2f9a 01-03 17:55:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2f9b 01-03 17:55:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f9c 01-03 17:55:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f9d 01-03 17:55:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f9e 01-03 17:55:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f9f 01-03 17:55:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[2fa0 01-03 17:55:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2fa1 01-03 17:55:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fa2 01-03 17:55:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2fa3 01-03 17:55:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fa4 01-03 17:55:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[2fa5 01-03 17:55:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fa6 01-03 17:55:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info
[2fa7 01-03 17:55:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]
[2fa8 01-03 17:55:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile
[2fa9 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2faa 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2fab 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fac 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fad 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fae 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2faf 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2fb0 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2fb1 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2fb2 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2fb3 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2fb4 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2fb5 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2fb6 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2fb7 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415c00 gate 1578074145493472600 evaluation starts
[2fb8 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415c00 signed by 0 principal evaluation starts (used [false])
[2fb9 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415c00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2fba 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2fbb 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415c00 principal evaluation fails
[2fbc 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415c00 gate 1578074145493472600 evaluation fails
[2fbd 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2fbe 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2fbf 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2fc0 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[2fc1 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[2fc2 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2fc3 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00542c500 gate 1578074145494915400 evaluation starts
[2fc4 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00542c500 signed by 0 principal evaluation starts (used [false])
[2fc5 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00542c500 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[2fc6 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00542c500 principal evaluation succeeds for identity 0
[2fc7 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00542c500 gate 1578074145494915400 evaluation succeeds
[2fc8 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2fc9 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2fca 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2fcb 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2fcc 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2fcd 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[2fce 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[2fcf 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[2fd0 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[2fd1 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fd2 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fd3 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2fd4 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2fd5 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2fd6 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2fd7 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2fd8 01-03 17:55:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2fd9 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2fda 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2fdb 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2fdc 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005446cc0 gate 1578074145501165300 evaluation starts
[2fdd 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005446cc0 signed by 0 principal evaluation starts (used [false])
[2fde 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005446cc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2fdf 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005446cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2fe0 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005446cc0 principal evaluation fails
[2fe1 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005446cc0 gate 1578074145501165300 evaluation fails
[2fe2 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2fe3 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2fe4 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2fe5 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2fe6 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2fe7 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2fe8 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054475c0 gate 1578074145506439700 evaluation starts
[2fe9 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054475c0 signed by 0 principal evaluation starts (used [false])
[2fea 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054475c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[2feb 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054475c0 principal evaluation succeeds for identity 0
[2fec 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054475c0 gate 1578074145506439700 evaluation succeeds
[2fed 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2fee 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2fef 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ff0 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ff1 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ff2 01-03 17:55:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[2ff3 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ff4 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ff5 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ff6 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2ff7 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2ff8 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2ff9 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2ffa 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2ffb 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2ffc 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[2ffd 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[2ffe 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2fff 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545d2d0 gate 1578074145514632000 evaluation starts
[3000 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545d2d0 signed by 0 principal evaluation starts (used [false])
[3001 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545d2d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3002 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545d2d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3003 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545d2d0 principal evaluation fails
[3004 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545d2d0 gate 1578074145514632000 evaluation fails
[3005 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3006 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3007 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3008 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3009 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[300a 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[300b 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545dbd0 gate 1578074145518544000 evaluation starts
[300c 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545dbd0 signed by 0 principal evaluation starts (used [false])
[300d 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545dbd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[300e 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545dbd0 principal evaluation succeeds for identity 0
[300f 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545dbd0 gate 1578074145518544000 evaluation succeeds
[3010 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3011 01-03 17:55:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3012 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3013 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3014 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3015 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3016 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3017 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3018 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3019 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[301a 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[301b 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[301c 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[301d 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[301e 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[301f 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3020 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3021 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005477ce0 gate 1578074145524616200 evaluation starts
[3022 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005477ce0 signed by 0 principal evaluation starts (used [false])
[3023 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005477ce0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3024 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005477ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3025 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005477ce0 principal evaluation fails
[3026 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005477ce0 gate 1578074145524616200 evaluation fails
[3027 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3028 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3029 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[302a 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[302b 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[302c 01-03 17:55:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[302d 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054845e0 gate 1578074145529975300 evaluation starts
[302e 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054845e0 signed by 0 principal evaluation starts (used [false])
[302f 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054845e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3030 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054845e0 principal evaluation succeeds for identity 0
[3031 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054845e0 gate 1578074145529975300 evaluation succeeds
[3032 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3033 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3034 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3035 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3036 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3037 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3038 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3039 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[303a 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[303b 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[303c 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[303d 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[303e 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[303f 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3040 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3041 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3042 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3043 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3044 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3045 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3046 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3047 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3048 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3049 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1630 gate 1578074145538324800 evaluation starts
[304a 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1630 signed by 0 principal evaluation starts (used [false])
[304b 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1630 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[304c 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[304d 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1630 principal evaluation fails
[304e 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1630 gate 1578074145538324800 evaluation fails
[304f 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3050 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3051 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3052 01-03 17:55:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3053 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3054 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3055 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1f30 gate 1578074145540582600 evaluation starts
[3056 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1f30 signed by 0 principal evaluation starts (used [false])
[3057 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1f30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3058 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1f30 principal evaluation succeeds for identity 0
[3059 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a1f30 gate 1578074145540582600 evaluation succeeds
[305a 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[305b 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[305c 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[305d 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[305e 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[305f 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3060 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3061 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3062 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3063 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3064 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3065 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3066 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3067 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3068 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3069 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054c1990 gate 1578074145543653500 evaluation starts
[306a 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054c1990 signed by 0 principal evaluation starts (used [false])
[306b 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054c1990 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[306c 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054c1990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[306d 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054c1990 principal evaluation fails
[306e 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054c1990 gate 1578074145543653500 evaluation fails
[306f 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3070 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3071 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3072 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3073 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3074 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3075 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d2290 gate 1578074145546999200 evaluation starts
[3076 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d2290 signed by 0 principal evaluation starts (used [false])
[3077 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d2290 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3078 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d2290 principal evaluation succeeds for identity 0
[3079 01-03 17:55:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d2290 gate 1578074145546999200 evaluation succeeds
[307a 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[307b 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[307c 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[307d 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[307e 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[307f 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3080 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3081 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[3082 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3083 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3084 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11471321949578990556 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[3085 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11471321949578990556 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3086 01-03 17:55:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3087 01-03 17:55:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11471321949578990556 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[3088 01-03 17:55:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11471321949578990556 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[3089 01-03 17:55:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[308a 01-03 17:55:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[308b 01-03 17:55:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[308c 01-03 17:55:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[308d 01-03 17:55:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[308e 01-03 17:55:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5288998755209840403 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[308f 01-03 17:55:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5288998755209840403 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3090 01-03 17:55:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3091 01-03 17:55:45.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3092 01-03 17:55:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3093 01-03 17:55:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3094 01-03 17:55:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3095 01-03 17:55:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3096 01-03 17:55:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3097 01-03 17:55:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3098 01-03 17:55:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3099 01-03 17:55:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[309a 01-03 17:55:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[309b 01-03 17:55:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[309c 01-03 17:55:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[309d 01-03 17:55:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[309e 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[309f 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[30a0 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315100D1801
[30a1 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6D4D78398808AE9087AFF0A26B100FE98D3C532FB170F72370332BFEABA04AE3
[30a2 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[30a3 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30a4 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30a5 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30a6 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30a7 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[30a8 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30a9 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30aa 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[30ab 01-03 17:55:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30ac 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[30ad 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30ae 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[30af 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[30b0 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 46 2c 72 9c 95 8a 03 d9 ca ea 38 1c 97 78 2b |\F,r.......8..x+|
00000010 a3 16 2a 47 c0 a5 28 4d ab 7a 31 0a e0 72 72 08 |..*G..(M.z1..rr.|
[30b1 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 f6 7a ff a4 70 24 46 4a d9 40 67 |0D. U.z..p$FJ.@g|
00000010 33 27 93 a3 94 e7 b7 d5 58 74 14 da 87 95 c6 2d |3'......Xt.....-|
00000020 55 7c e4 24 02 20 48 b5 cb f3 f5 6d ff b1 23 8c |U|.$. H....m..#.|
00000030 40 c6 b1 ba c6 66 b7 54 5a f3 38 33 8e 1b 22 33 |@....f.TZ.83.."3|
00000040 c9 30 9e 0b b2 65 |.0...e|
[30b2 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[30b3 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 8b 05 2e 6d 6b 61 b2 c0 58 b4 |0E.!.....mka..X.|
00000010 ce d4 03 18 53 ea ae 7f c0 99 15 53 88 57 96 54 |....S......S.W.T|
00000020 ab 2f 5c ec 1b 02 20 51 d5 35 bd 86 ac 5e 29 4d |./\... Q.5...^)M|
00000030 45 45 e7 61 45 9d 68 b6 d1 28 24 04 0e 2a b3 fb |EE.aE.h..($..*..|
00000040 39 09 ca a3 bf 27 c6 |9....'.|
[30b4 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[30b5 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[30b6 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46
[30b7 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46
[30b8 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[30b9 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30ba 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30bb 01-03 17:55:46.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30bc 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes
[30bd 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes
[30be 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30bf 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes
[30c0 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30c1 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30c2 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30c3 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30c4 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[30c5 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30c6 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[30c7 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes
[30c8 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30c9 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes
[30ca 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30cb 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes
[30cc 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes
[30cd 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30ce 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes
[30cf 01-03 17:55:46.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30d0 01-03 17:55:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:3479795367479488668 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[30d1 01-03 17:55:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3479795367479488668 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[30d2 01-03 17:55:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[30d3 01-03 17:55:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30d4 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[30d5 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30d6 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[30d7 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[30d8 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b bf 1a 8b 4f a2 8b e1 1b f3 a6 ea d4 b7 fb c5 |....O...........|
00000010 17 d7 bd 6b 57 0d e1 49 bc 83 6c c1 1b 02 bf df |...kW..I..l.....|
[30d9 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 1d 6c df 5d 75 92 b5 90 64 66 22 |0D. ..l.]u...df"|
00000010 98 7a 62 40 98 a4 57 91 ef b4 5b c2 1a da 0b 6b |.zb@..W...[....k|
00000020 a5 c0 63 42 02 20 61 ba 58 ac 81 f7 56 59 b6 1f |..cB. a.X...VY..|
00000030 29 a5 8e 47 95 69 4e ce 67 0a 0e 81 57 88 0e a8 |)..G.iN.g...W...|
00000040 52 83 4f 97 b7 0e |R.O...|
[30da 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[30db 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 9c b9 58 16 41 02 25 38 91 6a 63 |0D. ...X.A.%8.jc|
00000010 e3 5d 9e 4e 9b e3 af ff 8f b6 7a 26 cd af 63 e4 |.].N......z&..c.|
00000020 a9 11 cb ee 02 20 7f 38 f7 88 02 dd 3c 12 37 3e |..... .8....<.7>|
00000030 b6 81 b1 62 2d df 1c 33 50 bb 53 c2 4f 10 e5 67 |...b-..3P.S.O..g|
00000040 db 54 67 cd b2 fb |.Tg...|
[30dc 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[30dd 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[30de 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47
[30df 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47
[30e0 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[30e1 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30e2 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30e3 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30e4 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[30e5 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30e6 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30e7 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[30e8 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[30e9 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[30ea 01-03 17:55:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30eb 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[30ec 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[30ed 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30ee 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[30ef 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[30f0 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30f1 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[30f2 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[30f3 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[30f4 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[30f5 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[30f6 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[30f7 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 1e 93 6b 12 3b 73 a9 bb e0 87 de cb 8c 9b ed |...k.;s.........|
00000010 d8 50 15 a5 9c ca 8a 25 37 49 c1 0c c7 4a 51 6a |.P.....%7I...JQj|
[30f8 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 e5 34 f1 66 4e 7c ac db b2 a5 |0E.!...4.fN|....|
00000010 da fe 76 14 6d 09 07 e8 03 fb 27 e7 74 7e 74 98 |..v.m.....'.t~t.|
00000020 76 37 45 07 a7 02 20 32 4c 9f 91 c2 0d 1c ec da |v7E... 2L.......|
00000030 52 5e 6d 3a 3d 12 f2 a6 7b 49 c5 c3 0c dc ad 13 |R^m:=...{I......|
00000040 0c 4e 5e 37 e9 d7 d8 |.N^7...|
[30f9 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[30fa 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a070 gate 1578074148018882000 evaluation starts
[30fb 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a070 signed by 0 principal evaluation starts (used [false])
[30fc 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a070 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[30fd 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[30fe 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a070 principal evaluation fails
[30ff 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a070 gate 1578074148018882000 evaluation fails
[3100 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3101 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3102 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3103 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 1e 93 6b 12 3b 73 a9 bb e0 87 de cb 8c 9b ed |...k.;s.........|
00000010 d8 50 15 a5 9c ca 8a 25 37 49 c1 0c c7 4a 51 6a |.P.....%7I...JQj|
[3104 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 e5 34 f1 66 4e 7c ac db b2 a5 |0E.!...4.fN|....|
00000010 da fe 76 14 6d 09 07 e8 03 fb 27 e7 74 7e 74 98 |..v.m.....'.t~t.|
00000020 76 37 45 07 a7 02 20 32 4c 9f 91 c2 0d 1c ec da |v7E... 2L.......|
00000030 52 5e 6d 3a 3d 12 f2 a6 7b 49 c5 c3 0c dc ad 13 |R^m:=...{I......|
00000040 0c 4e 5e 37 e9 d7 d8 |.N^7...|
[3105 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3106 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a970 gate 1578074148019758300 evaluation starts
[3107 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a970 signed by 0 principal evaluation starts (used [false])
[3108 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a970 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3109 01-03 17:55:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a970 principal evaluation succeeds for identity 0
[310a 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0a970 gate 1578074148019758300 evaluation succeeds
[310b 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[310c 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[310d 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[310e 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[310f 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3110 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes]}
[3111 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44
[3112 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44
[3113 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3114 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3115 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3116 01-03 17:55:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3117 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3118 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3119 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[311a 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[311b 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[311c 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[311d 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[311e 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[311f 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3120 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3121 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3122 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3123 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3124 01-03 17:55:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3125 01-03 17:55:48.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3126 01-03 17:55:48.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3127 01-03 17:55:48.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3128 01-03 17:55:48.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3129 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[312a 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[312b 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[312c 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[312d 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[312e 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[312f 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3130 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3131 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3132 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3133 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3134 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3135 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 05 dd f7 50 d9 74 57 b6 ca 10 ed f9 f2 f9 ad |E...P.tW........|
00000010 85 62 32 36 5a 7a 91 c9 db 4a e5 b6 ca ec 32 f1 |.b26Zz...J....2.|
[3136 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 37 c3 6f 90 b8 e1 41 21 e5 22 |0E.!..7.o...A!."|
00000010 cb b5 a1 3a 3c 14 3f 72 b3 b3 80 5c cc 45 a7 e4 |...:<.?r...\.E..|
00000020 e1 2d 1f 07 7f 02 20 3b a5 3a 89 63 35 c9 3c 7e |.-.... ;.:.c5.<~|
00000030 6d 12 74 79 f7 a2 26 29 0a fd b9 ac eb 99 26 59 |m.ty..&)......&Y|
00000040 c1 81 18 81 73 c7 fe |....s..|
[3137 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3138 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3b240 gate 1578074148098134800 evaluation starts
[3139 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3b240 signed by 0 principal evaluation starts (used [false])
[313a 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3b240 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[313b 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3b240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[313c 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3b240 principal evaluation fails
[313d 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3b240 gate 1578074148098134800 evaluation fails
[313e 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[313f 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3140 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3141 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 05 dd f7 50 d9 74 57 b6 ca 10 ed f9 f2 f9 ad |E...P.tW........|
00000010 85 62 32 36 5a 7a 91 c9 db 4a e5 b6 ca ec 32 f1 |.b26Zz...J....2.|
[3142 01-03 17:55:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 37 c3 6f 90 b8 e1 41 21 e5 22 |0E.!..7.o...A!."|
00000010 cb b5 a1 3a 3c 14 3f 72 b3 b3 80 5c cc 45 a7 e4 |...:<.?r...\.E..|
00000020 e1 2d 1f 07 7f 02 20 3b a5 3a 89 63 35 c9 3c 7e |.-.... ;.:.c5.<~|
00000030 6d 12 74 79 f7 a2 26 29 0a fd b9 ac eb 99 26 59 |m.ty..&)......&Y|
00000040 c1 81 18 81 73 c7 fe |....s..|
[3143 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3144 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3bb40 gate 1578074148100213700 evaluation starts
[3145 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3bb40 signed by 0 principal evaluation starts (used [false])
[3146 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3bb40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3147 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3bb40 principal evaluation succeeds for identity 0
[3148 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3bb40 gate 1578074148100213700 evaluation succeeds
[3149 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[314a 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[314b 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[314c 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[314d 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[314e 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}
[314f 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46
[3150 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46
[3151 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3152 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3153 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3154 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3155 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3156 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3157 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3158 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3159 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[315a 01-03 17:55:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[315b 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[315c 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[315e 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[315d 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[315f 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3160 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3161 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3162 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3163 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3164 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3165 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3166 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3167 01-03 17:55:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3168 01-03 17:55:48.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3169 01-03 17:55:48.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[316a 01-03 17:55:48.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[316b 01-03 17:55:48.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[316c 01-03 17:55:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[316d 01-03 17:55:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315102B
[316e 01-03 17:55:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 129E4511B99524E808D9ED5250F8DEC374267285197538B0112369493EC78FA6
[316f 01-03 17:55:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3170 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3171 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[3172 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3173 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3174 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[3175 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3176 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3177 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3178 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3179 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[317a 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[317b 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[317c 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[317d 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[317e 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[317f 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[3180 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3181 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[3182 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3183 01-03 17:55:48.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 9e 45 11 b9 95 24 e8 08 d9 ed 52 50 f8 de c3 |..E...$....RP...|
00000010 74 26 72 85 19 75 38 b0 11 23 69 49 3e c7 8f a6 |t&r..u8..#iI>...|
[3184 01-03 17:55:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 3c 6f 83 bc fb 00 3c 22 ea a6 |0E.!..<o....<"..|
00000010 ad 13 ce 3a 3d b6 5e 0d 9d c4 9a a2 73 5b 2b 90 |...:=.^.....s[+.|
00000020 0e 26 83 dc 58 02 20 72 23 b3 2d 55 75 93 4f b0 |.&..X. r#.-Uu.O.|
00000030 98 62 02 78 a0 49 0a 91 43 1d 58 19 b8 2f f5 5c |.b.x.I..C.X../.\|
00000040 a5 a3 ae d4 47 eb 28 |....G.(|
[3185 01-03 17:55:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[3186 01-03 17:55:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3187 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6908507711123780280 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3188 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:6908507711123780280 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3189 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6908507711123780280 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[318a 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[318b 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[318c 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[318d 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[318e 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[318f 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3190 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[3191 01-03 17:55:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3192 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:15660512930720374356 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3193 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:15660512930720374356 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3194 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15660512930720374356 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3195 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3196 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3197 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3198 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3199 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[319a 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[319b 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[319c 01-03 17:55:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[319d 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[319e 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[319f 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31a0 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[31a1 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[31a2 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31a3 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[31a4 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[31a5 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[31a6 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[31a7 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[31a8 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[31a9 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 2d a9 3d 01 f1 73 54 66 6d 4b 5d 6d 99 6f 1d |.-.=..sTfmK]m.o.|
00000010 8d 94 bc 59 12 1a d8 93 30 56 8e 10 74 8a 3d 0b |...Y....0V..t.=.|
[31aa 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f a6 26 bc f4 a5 79 a5 1f 79 6b 56 |0D. o.&...y..ykV|
00000010 22 dc aa 55 8a bd ee 81 fb ea 0b df 17 33 c9 54 |"..U.........3.T|
00000020 4b 6c cb 6c 02 20 30 80 2a 7e 46 0e eb 6b ea 73 |Kl.l. 0.*~F..k.s|
00000030 56 2a 1b 38 2d 01 0c 7f 00 62 f5 4b dc 7e ef 25 |V*.8-....b.K.~.%|
00000040 6b 90 07 08 8a 4a |k....J|
[31ab 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[31ac 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adf9f0 gate 1578074149089422400 evaluation starts
[31ad 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adf9f0 signed by 0 principal evaluation starts (used [false])
[31ae 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adf9f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[31af 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adf9f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[31b0 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adf9f0 principal evaluation fails
[31b1 01-03 17:55:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adf9f0 gate 1578074149089422400 evaluation fails
[31b2 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[31b3 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[31b4 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[31b5 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 2d a9 3d 01 f1 73 54 66 6d 4b 5d 6d 99 6f 1d |.-.=..sTfmK]m.o.|
00000010 8d 94 bc 59 12 1a d8 93 30 56 8e 10 74 8a 3d 0b |...Y....0V..t.=.|
[31b6 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f a6 26 bc f4 a5 79 a5 1f 79 6b 56 |0D. o.&...y..ykV|
00000010 22 dc aa 55 8a bd ee 81 fb ea 0b df 17 33 c9 54 |"..U.........3.T|
00000020 4b 6c cb 6c 02 20 30 80 2a 7e 46 0e eb 6b ea 73 |Kl.l. 0.*~F..k.s|
00000030 56 2a 1b 38 2d 01 0c 7f 00 62 f5 4b dc 7e ef 25 |V*.8-....b.K.~.%|
00000040 6b 90 07 08 8a 4a |k....J|
[31b7 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[31b8 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005afa2f0 gate 1578074149091203700 evaluation starts
[31b9 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005afa2f0 signed by 0 principal evaluation starts (used [false])
[31ba 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005afa2f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[31bb 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005afa2f0 principal evaluation succeeds for identity 0
[31bc 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005afa2f0 gate 1578074149091203700 evaluation succeeds
[31bd 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[31be 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[31bf 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[31c0 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[31c1 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[31c2 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}
[31c3 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47
[31c4 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47
[31c5 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[31c6 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c7 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c8 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c9 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[31ca 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31cb 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31cc 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31cd 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[31ce 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[31cf 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[31d0 01-03 17:55:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31d1 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[31d2 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[31d3 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31d4 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[31d5 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[31d6 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31d7 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[31d8 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[31d9 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[31da 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[31db 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[31dc 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[31dd 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 5a f3 61 7b 9a d8 02 51 4c 0b b9 a9 6f f9 c4 |:Z.a{...QL...o..|
00000010 67 ad aa 05 88 b3 97 08 55 92 7b e5 79 d9 69 be |g.......U.{.y.i.|
[31de 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 5a 2d 98 6f b2 60 38 1f 1e bf |0E.!..Z-.o.`8...|
00000010 2b 60 bb ff d5 6d 30 52 40 85 fa 8c 70 af 95 a5 |+`...m0R@...p...|
00000020 22 09 20 a6 9c 02 20 24 e8 0e 0f d0 c1 d9 5f 69 |". ... $......_i|
00000030 4f 3a 06 ea 54 a3 44 46 a3 9b 01 3d 9c fa 6f 98 |O:..T.DF...=..o.|
00000040 47 b9 e3 16 f8 b4 a5 |G......|
[31df 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[31e0 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b14af0 gate 1578074149114324600 evaluation starts
[31e1 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b14af0 signed by 0 principal evaluation starts (used [false])
[31e2 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b14af0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[31e3 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b14af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[31e4 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b14af0 principal evaluation fails
[31e5 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b14af0 gate 1578074149114324600 evaluation fails
[31e6 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[31e7 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[31e8 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[31e9 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 5a f3 61 7b 9a d8 02 51 4c 0b b9 a9 6f f9 c4 |:Z.a{...QL...o..|
00000010 67 ad aa 05 88 b3 97 08 55 92 7b e5 79 d9 69 be |g.......U.{.y.i.|
[31ea 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 5a 2d 98 6f b2 60 38 1f 1e bf |0E.!..Z-.o.`8...|
00000010 2b 60 bb ff d5 6d 30 52 40 85 fa 8c 70 af 95 a5 |+`...m0R@...p...|
00000020 22 09 20 a6 9c 02 20 24 e8 0e 0f d0 c1 d9 5f 69 |". ... $......_i|
00000030 4f 3a 06 ea 54 a3 44 46 a3 9b 01 3d 9c fa 6f 98 |O:..T.DF...=..o.|
00000040 47 b9 e3 16 f8 b4 a5 |G......|
[31eb 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[31ec 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b153f0 gate 1578074149114962100 evaluation starts
[31ed 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b153f0 signed by 0 principal evaluation starts (used [false])
[31ee 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b153f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[31ef 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b153f0 principal evaluation succeeds for identity 0
[31f0 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b153f0 gate 1578074149114962100 evaluation succeeds
[31f1 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[31f2 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[31f3 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[31f4 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[31f5 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[31f6 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes]}
[31f7 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45
[31f8 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45
[31f9 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[31fa 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31fb 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31fc 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31fd 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[31fe 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31ff 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3200 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3201 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[3202 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3203 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3204 01-03 17:55:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3205 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3206 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6544003294657317482 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3207 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[3208 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14409158826781129798 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3209 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[320a 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:537607027934675653 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[320b 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:537607027934675653 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[320c 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[320d 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14409158826781129798 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[320e 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[320f 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6544003294657317482 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3210 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3211 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14409158826781129798 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3212 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14409158826781129798 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3213 01-03 17:55:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3214 01-03 17:55:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 537607027934675653 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[3215 01-03 17:55:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 537607027934675653 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[3216 01-03 17:55:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 537607027934675653 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[3217 01-03 17:55:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3218 01-03 17:55:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6544003294657317482 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[3219 01-03 17:55:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6544003294657317482 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[321a 01-03 17:55:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6544003294657317482 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[321b 01-03 17:55:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[321c 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315102C
[321d 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A3667B2AEBF77B7DA4B19FAAA127483AD0C759C88FDF9D67E11644BA507ACC4A
[321e 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[321f 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3220 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3221 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[3222 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3223 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[3224 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3225 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3226 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[3227 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[3228 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3229 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[322a 01-03 17:55:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[322b 01-03 17:55:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[322c 01-03 17:55:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[322d 01-03 17:55:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[322e 01-03 17:55:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[322f 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3230 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3231 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3232 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3233 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3234 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3235 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3236 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3237 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 5a f3 61 7b 9a d8 02 51 4c 0b b9 a9 6f f9 c4 |:Z.a{...QL...o..|
00000010 67 ad aa 05 88 b3 97 08 55 92 7b e5 79 d9 69 be |g.......U.{.y.i.|
[3238 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 5a 2d 98 6f b2 60 38 1f 1e bf |0E.!..Z-.o.`8...|
00000010 2b 60 bb ff d5 6d 30 52 40 85 fa 8c 70 af 95 a5 |+`...m0R@...p...|
00000020 22 09 20 a6 9c 02 20 24 e8 0e 0f d0 c1 d9 5f 69 |". ... $......_i|
00000030 4f 3a 06 ea 54 a3 44 46 a3 9b 01 3d 9c fa 6f 98 |O:..T.DF...=..o.|
00000040 47 b9 e3 16 f8 b4 a5 |G......|
[3239 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[323a 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[323b 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61110 gate 1578074149303040200 evaluation starts
[323c 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61110 signed by 0 principal evaluation starts (used [false])
[323d 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61110 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[323e 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[323f 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61110 principal evaluation fails
[3240 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61110 gate 1578074149303040200 evaluation fails
[3241 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3242 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3243 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3244 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 5a f3 61 7b 9a d8 02 51 4c 0b b9 a9 6f f9 c4 |:Z.a{...QL...o..|
00000010 67 ad aa 05 88 b3 97 08 55 92 7b e5 79 d9 69 be |g.......U.{.y.i.|
[3245 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 5a 2d 98 6f b2 60 38 1f 1e bf |0E.!..Z-.o.`8...|
00000010 2b 60 bb ff d5 6d 30 52 40 85 fa 8c 70 af 95 a5 |+`...m0R@...p...|
00000020 22 09 20 a6 9c 02 20 24 e8 0e 0f d0 c1 d9 5f 69 |". ... $......_i|
00000030 4f 3a 06 ea 54 a3 44 46 a3 9b 01 3d 9c fa 6f 98 |O:..T.DF...=..o.|
00000040 47 b9 e3 16 f8 b4 a5 |G......|
[3246 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3247 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61a10 gate 1578074149307060500 evaluation starts
[3248 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61a10 signed by 0 principal evaluation starts (used [false])
[3249 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61a10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[324a 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61a10 principal evaluation succeeds for identity 0
[324b 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b61a10 gate 1578074149307060500 evaluation succeeds
[324c 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[324d 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[324e 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[324f 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3250 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[3251 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3252 01-03 17:55:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3253 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 66 7b 2a eb f7 7b 7d a4 b1 9f aa a1 27 48 3a |.f{*..{}.....'H:|
00000010 d0 c7 59 c8 8f df 9d 67 e1 16 44 ba 50 7a cc 4a |..Y....g..D.Pz.J|
[3254 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 5f 56 99 27 8f 66 8f 0a 1e 4d |0E.!.._V.'.f...M|
00000010 82 e6 6d 5f 9e 51 d4 3e f7 64 5a 9c 22 99 39 82 |..m_.Q.>.dZ.".9.|
00000020 ee 1a ab 41 85 02 20 0b 42 8e 72 f8 af cc 72 0e |...A.. .B.r...r.|
00000030 4f 5f d2 58 bb 13 28 ab ec 4b bb 47 df 02 98 a6 |O_.X..(..K.G....|
00000040 1b d6 de cc bb 89 2b |......+|
[3255 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3256 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3257 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3258 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3259 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b bf 1a 8b 4f a2 8b e1 1b f3 a6 ea d4 b7 fb c5 |....O...........|
00000010 17 d7 bd 6b 57 0d e1 49 bc 83 6c c1 1b 02 bf df |...kW..I..l.....|
[325a 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 1d 6c df 5d 75 92 b5 90 64 66 22 |0D. ..l.]u...df"|
00000010 98 7a 62 40 98 a4 57 91 ef b4 5b c2 1a da 0b 6b |.zb@..W...[....k|
00000020 a5 c0 63 42 02 20 61 ba 58 ac 81 f7 56 59 b6 1f |..cB. a.X...VY..|
00000030 29 a5 8e 47 95 69 4e ce 67 0a 0e 81 57 88 0e a8 |)..G.iN.g...W...|
00000040 52 83 4f 97 b7 0e |R.O...|
[325b 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[325c 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[325d 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[325e 01-03 17:55:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[325f 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[3260 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3261 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 66 7b 2a eb f7 7b 7d a4 b1 9f aa a1 27 48 3a |.f{*..{}.....'H:|
00000010 d0 c7 59 c8 8f df 9d 67 e1 16 44 ba 50 7a cc 4a |..Y....g..D.Pz.J|
[3262 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 5f 56 99 27 8f 66 8f 0a 1e 4d |0E.!.._V.'.f...M|
00000010 82 e6 6d 5f 9e 51 d4 3e f7 64 5a 9c 22 99 39 82 |..m_.Q.>.dZ.".9.|
00000020 ee 1a ab 41 85 02 20 0b 42 8e 72 f8 af cc 72 0e |...A.. .B.r...r.|
00000030 4f 5f d2 58 bb 13 28 ab ec 4b bb 47 df 02 98 a6 |O_.X..(..K.G....|
00000040 1b d6 de cc bb 89 2b |......+|
[3263 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3264 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 6d c1 e9 6a 9b a2 ea 14 a7 13 |0E.!..m..j......|
00000010 74 68 e8 18 fa b8 9a 07 22 2a 01 49 0d 12 ef b2 |th......"*.I....|
00000020 b2 3d df e9 03 02 20 4a f8 d0 09 61 51 99 8e ce |.=.... J...aQ...|
00000030 6c 5c 40 de c6 69 dd 91 04 00 1f 0f 21 61 27 67 |l\@..i......!a'g|
00000040 81 5d 39 86 2e 7d 4d |.]9..}M|
[3265 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3266 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3267 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3268 01-03 17:55:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3269 01-03 17:55:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[326a 01-03 17:55:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[326b 01-03 17:55:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[326c 01-03 17:55:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[326d 01-03 17:55:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[326e 01-03 17:55:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[326f 01-03 17:55:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3270 01-03 17:55:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3271 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3272 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3273 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3274 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3275 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 2d a9 3d 01 f1 73 54 66 6d 4b 5d 6d 99 6f 1d |.-.=..sTfmK]m.o.|
00000010 8d 94 bc 59 12 1a d8 93 30 56 8e 10 74 8a 3d 0b |...Y....0V..t.=.|
[3276 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f a6 26 bc f4 a5 79 a5 1f 79 6b 56 |0D. o.&...y..ykV|
00000010 22 dc aa 55 8a bd ee 81 fb ea 0b df 17 33 c9 54 |"..U.........3.T|
00000020 4b 6c cb 6c 02 20 30 80 2a 7e 46 0e eb 6b ea 73 |Kl.l. 0.*~F..k.s|
00000030 56 2a 1b 38 2d 01 0c 7f 00 62 f5 4b dc 7e ef 25 |V*.8-....b.K.~.%|
00000040 6b 90 07 08 8a 4a |k....J|
[3277 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3278 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b5bb20 gate 1578074149341059200 evaluation starts
[3279 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b5bb20 signed by 0 principal evaluation starts (used [false])
[327a 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b5bb20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[327b 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b5bb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[327c 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b5bb20 principal evaluation fails
[327d 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b5bb20 gate 1578074149341059200 evaluation fails
[327e 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[327f 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3280 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3281 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 2d a9 3d 01 f1 73 54 66 6d 4b 5d 6d 99 6f 1d |.-.=..sTfmK]m.o.|
00000010 8d 94 bc 59 12 1a d8 93 30 56 8e 10 74 8a 3d 0b |...Y....0V..t.=.|
[3282 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f a6 26 bc f4 a5 79 a5 1f 79 6b 56 |0D. o.&...y..ykV|
00000010 22 dc aa 55 8a bd ee 81 fb ea 0b df 17 33 c9 54 |"..U.........3.T|
00000020 4b 6c cb 6c 02 20 30 80 2a 7e 46 0e eb 6b ea 73 |Kl.l. 0.*~F..k.s|
00000030 56 2a 1b 38 2d 01 0c 7f 00 62 f5 4b dc 7e ef 25 |V*.8-....b.K.~.%|
00000040 6b 90 07 08 8a 4a |k....J|
[3283 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3284 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ba8420 gate 1578074149342979400 evaluation starts
[3285 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ba8420 signed by 0 principal evaluation starts (used [false])
[3286 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ba8420 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3287 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ba8420 principal evaluation succeeds for identity 0
[3288 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ba8420 gate 1578074149342979400 evaluation succeeds
[3289 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[328a 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[328b 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[328c 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[328d 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[328e 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[328f 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3290 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b bf 1a 8b 4f a2 8b e1 1b f3 a6 ea d4 b7 fb c5 |....O...........|
00000010 17 d7 bd 6b 57 0d e1 49 bc 83 6c c1 1b 02 bf df |...kW..I..l.....|
[3291 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 1d 6c df 5d 75 92 b5 90 64 66 22 |0D. ..l.]u...df"|
00000010 98 7a 62 40 98 a4 57 91 ef b4 5b c2 1a da 0b 6b |.zb@..W...[....k|
00000020 a5 c0 63 42 02 20 61 ba 58 ac 81 f7 56 59 b6 1f |..cB. a.X...VY..|
00000030 29 a5 8e 47 95 69 4e ce 67 0a 0e 81 57 88 0e a8 |)..G.iN.g...W...|
00000040 52 83 4f 97 b7 0e |R.O...|
[3292 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[3293 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3294 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3295 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 66 7b 2a eb f7 7b 7d a4 b1 9f aa a1 27 48 3a |.f{*..{}.....'H:|
00000010 d0 c7 59 c8 8f df 9d 67 e1 16 44 ba 50 7a cc 4a |..Y....g..D.Pz.J|
[3296 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 5f 56 99 27 8f 66 8f 0a 1e 4d |0E.!.._V.'.f...M|
00000010 82 e6 6d 5f 9e 51 d4 3e f7 64 5a 9c 22 99 39 82 |..m_.Q.>.dZ.".9.|
00000020 ee 1a ab 41 85 02 20 0b 42 8e 72 f8 af cc 72 0e |...A.. .B.r...r.|
00000030 4f 5f d2 58 bb 13 28 ab ec 4b bb 47 df 02 98 a6 |O_.X..(..K.G....|
00000040 1b d6 de cc bb 89 2b |......+|
[3297 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3298 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3299 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[329a 01-03 17:55:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[329b 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[329c 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[329d 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[329e 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[329f 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[32a1 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32a0 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32a2 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[32a3 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32a4 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[32a5 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[32a6 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32a7 01-03 17:55:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32a8 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32a9 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[32aa 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[32ab 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[32ac 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[32ad 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[32ae 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[32af 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[32b0 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[32b1 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[32b2 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bbfaa0 gate 1578074149452329000 evaluation starts
[32b3 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bbfaa0 signed by 0 principal evaluation starts (used [false])
[32b4 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bbfaa0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[32b5 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bbfaa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[32b6 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bbfaa0 principal evaluation fails
[32b7 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bbfaa0 gate 1578074149452329000 evaluation fails
[32b8 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[32b9 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[32ba 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[32bb 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[32bc 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[32bd 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[32be 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[32bf 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bda3a0 gate 1578074149456390700 evaluation starts
[32c0 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bda3a0 signed by 0 principal evaluation starts (used [false])
[32c1 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bda3a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[32c2 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bda3a0 principal evaluation succeeds for identity 0
[32c3 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bda3a0 gate 1578074149456390700 evaluation succeeds
[32c4 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[32c5 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[32c6 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[32c7 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[32c8 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[32c9 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[32ca 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[32cb 01-03 17:55:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[32cc 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32cd 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32ce 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[32cf 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[32d0 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[32d1 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[32d2 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[32d3 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[32d4 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[32d5 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[32d6 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[32d7 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf2b60 gate 1578074149464703800 evaluation starts
[32d8 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf2b60 signed by 0 principal evaluation starts (used [false])
[32d9 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf2b60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[32da 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf2b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[32db 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf2b60 principal evaluation fails
[32dc 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf2b60 gate 1578074149464703800 evaluation fails
[32dd 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[32de 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[32df 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[32e0 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[32e1 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[32e2 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[32e3 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf3460 gate 1578074149466916000 evaluation starts
[32e4 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf3460 signed by 0 principal evaluation starts (used [false])
[32e5 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf3460 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[32e6 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf3460 principal evaluation succeeds for identity 0
[32e7 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bf3460 gate 1578074149466916000 evaluation succeeds
[32e8 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[32e9 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[32ea 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[32eb 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[32ec 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32ed 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[32ee 01-03 17:55:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[32ef 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[32f0 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[32f1 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[32f2 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32f3 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32f4 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[32f5 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[32f6 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[32f7 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[32f8 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[32f9 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[32fa 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[32fb 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[32fc 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[32fd 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0be00 gate 1578074149476382200 evaluation starts
[32fe 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0be00 signed by 0 principal evaluation starts (used [false])
[32ff 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0be00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3300 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0be00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3301 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0be00 principal evaluation fails
[3302 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0be00 gate 1578074149476382200 evaluation fails
[3303 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3304 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3305 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3306 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3307 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3308 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3309 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c22700 gate 1578074149478974400 evaluation starts
[330a 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c22700 signed by 0 principal evaluation starts (used [false])
[330b 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c22700 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[330c 01-03 17:55:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c22700 principal evaluation succeeds for identity 0
[330d 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c22700 gate 1578074149478974400 evaluation succeeds
[330e 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[330f 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3310 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3311 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3312 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3313 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3314 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3315 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3316 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3317 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3318 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3319 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[331a 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[331b 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[331c 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[331d 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36160 gate 1578074149483607800 evaluation starts
[331e 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36160 signed by 0 principal evaluation starts (used [false])
[331f 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36160 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3320 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3321 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36160 principal evaluation fails
[3322 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36160 gate 1578074149483607800 evaluation fails
[3323 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3324 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3325 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3326 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3327 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3328 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3329 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36a60 gate 1578074149488295800 evaluation starts
[332a 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36a60 signed by 0 principal evaluation starts (used [false])
[332b 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36a60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[332c 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36a60 principal evaluation succeeds for identity 0
[332d 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c36a60 gate 1578074149488295800 evaluation succeeds
[332e 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[332f 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3330 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3331 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3332 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3333 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3334 01-03 17:55:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3335 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3336 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3337 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3338 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3339 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[333a 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[333b 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[333c 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[333d 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[333e 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[333f 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3340 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c50770 gate 1578074149492622000 evaluation starts
[3341 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c50770 signed by 0 principal evaluation starts (used [false])
[3342 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c50770 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3343 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c50770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3344 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c50770 principal evaluation fails
[3345 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c50770 gate 1578074149492622000 evaluation fails
[3346 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3347 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3348 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3349 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[334a 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[334b 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[334c 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c51070 gate 1578074149494966900 evaluation starts
[334d 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c51070 signed by 0 principal evaluation starts (used [false])
[334e 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c51070 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[334f 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c51070 principal evaluation succeeds for identity 0
[3350 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c51070 gate 1578074149494966900 evaluation succeeds
[3351 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3352 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3353 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3354 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3355 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3356 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3357 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3358 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3359 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[335a 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[335b 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[335c 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[335d 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[335e 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[335f 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3360 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3361 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3362 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65180 gate 1578074149498745200 evaluation starts
[3363 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65180 signed by 0 principal evaluation starts (used [false])
[3364 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65180 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3365 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3366 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65180 principal evaluation fails
[3367 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65180 gate 1578074149498745200 evaluation fails
[3368 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3369 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[336a 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[336b 01-03 17:55:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[336c 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[336d 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[336e 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65a80 gate 1578074149501104000 evaluation starts
[336f 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65a80 signed by 0 principal evaluation starts (used [false])
[3370 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65a80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3371 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65a80 principal evaluation succeeds for identity 0
[3372 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c65a80 gate 1578074149501104000 evaluation succeeds
[3373 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3374 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3375 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3376 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3377 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3378 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3379 01-03 17:55:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[337a 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[337b 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[337c 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[337d 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[337e 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[337f 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7051650161535720503 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[3380 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7051650161535720503 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3381 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3382 01-03 17:55:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7051650161535720503 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[3383 01-03 17:55:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7051650161535720503 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[3384 01-03 17:55:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3385 01-03 17:55:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[3386 01-03 17:55:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3387 01-03 17:55:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3388 01-03 17:55:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3389 01-03 17:55:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3177741880863070453 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[338a 01-03 17:55:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3177741880863070453 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[338b 01-03 17:55:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[338c 01-03 17:55:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[338d 01-03 17:55:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[338e 01-03 17:55:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[338f 01-03 17:55:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3390 01-03 17:55:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3391 01-03 17:55:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3392 01-03 17:55:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3393 01-03 17:55:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3394 01-03 17:55:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3395 01-03 17:55:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3396 01-03 17:55:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3397 01-03 17:55:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3398 01-03 17:55:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3399 01-03 17:55:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[339a 01-03 17:55:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[339b 01-03 17:55:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315100E1801
[339c 01-03 17:55:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5D838C0CD63292D779C7B8F3F15FF2BB59C1C5EB72CC1EC2E3712DB586045777
[339d 01-03 17:55:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[339e 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[339f 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33a0 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33a1 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33a2 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[33a3 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33a4 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33a5 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[33a6 01-03 17:55:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33a7 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[33a8 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33a9 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[33aa 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[33ab 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df ba ec c2 93 85 0a 32 d0 27 bd 09 2e a3 a4 25 |.......2.'.....%|
00000010 73 d7 53 84 c1 51 fc d4 db 89 09 cc a4 21 ac b4 |s.S..Q.......!..|
[33ac 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 8a 33 73 d9 04 d7 54 08 94 c3 |0E.!...3s...T...|
00000010 f5 2c 29 0e 4f fb c8 03 21 2d d1 0d c2 8f 5f 3f |.,).O...!-...._?|
00000020 7f b3 41 bb 5f 02 20 2b ff e8 38 ff 9c 1e 2a 2f |..A._. +..8...*/|
00000030 75 1f 12 ab 36 80 a3 69 59 b0 16 fa 70 53 43 09 |u...6..iY...pSC.|
00000040 70 b0 25 c0 0d 6b e7 |p.%..k.|
[33ad 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[33ae 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 d1 a7 2b 40 f1 c5 a2 a9 37 93 1b |0D. '..+@....7..|
00000010 f7 6c a0 ca 08 bf 1b 4d 07 db c7 9a fb dc 53 4b |.l.....M......SK|
00000020 96 30 12 bd 02 20 78 33 84 fa 5c d8 5c 36 4b 24 |.0... x3..\.\6K$|
00000030 c8 80 64 47 8b 81 1b 4e c0 80 7e 18 fa c8 5e dd |..dG...N..~...^.|
00000040 32 28 63 59 94 f8 |2(cY..|
[33af 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[33b0 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[33b1 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48
[33b2 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48
[33b3 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[33b4 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33b5 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33b6 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33b7 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[33b8 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[33b9 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33ba 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[33bb 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33bc 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33bd 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33be 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33bf 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[33c0 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33c1 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[33c2 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[33c3 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33c4 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[33c5 01-03 17:55:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33c6 01-03 17:55:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[33c7 01-03 17:55:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[33c8 01-03 17:55:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33c9 01-03 17:55:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[33ca 01-03 17:55:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33cb 01-03 17:55:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:16858238744771778067 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[33cc 01-03 17:55:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16858238744771778067 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[33cd 01-03 17:55:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[33ce 01-03 17:55:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33cf 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[33d0 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33d1 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[33d2 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[33d3 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 18 f8 14 e0 52 a6 76 85 b7 8b ce 9b 93 01 60 |J....R.v.......`|
00000010 c8 51 ed ae a4 86 d3 b7 2e 83 71 30 9b 9c 7f 43 |.Q........q0...C|
[33d4 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 d4 07 cf 68 bb 6c a8 35 9e bc 5e |0D. ....h.l.5..^|
00000010 17 25 36 51 f4 82 da 12 ab bc 6b ea 48 c6 d5 10 |.%6Q......k.H...|
00000020 74 e3 d8 c6 02 20 6c 71 cf b8 59 64 de 80 0e 6c |t.... lq..Yd...l|
00000030 57 b3 51 bb 62 86 17 c1 85 7d cb 31 5c cd d3 ea |W.Q.b....}.1\...|
00000040 e9 a6 33 21 7f 0b |..3!..|
[33d5 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[33d6 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 31 9c 14 e8 e6 c6 ef 4f 8c e6 3f |0D. m1......O..?|
00000010 37 77 4e d3 20 7f 97 5f 8f 45 f7 88 4f a3 52 d7 |7wN. .._.E..O.R.|
00000020 ce e3 2f 26 02 20 04 2f 2b bf 71 12 93 f0 4b 33 |../&. ./+.q...K3|
00000030 83 49 75 bd a8 64 bf 4c 8a 3b 01 7a c8 7f 0c 30 |.Iu..d.L.;.z...0|
00000040 fc 04 f9 59 ff 2a |...Y.*|
[33d7 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[33d8 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[33d9 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49
[33da 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49
[33db 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[33dc 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33dd 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33de 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33df 01-03 17:55:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[33e0 01-03 17:55:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33e1 01-03 17:55:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33e2 01-03 17:55:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[33e3 01-03 17:55:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[33e4 01-03 17:55:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[33e5 01-03 17:55:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33e6 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[33e7 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[33e8 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33e9 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[33ea 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[33eb 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33ec 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[33ed 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[33ee 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[33ef 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[33f0 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[33f1 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[33f2 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 37 23 57 f1 cb 6d c6 ba e0 fd 5d 10 07 0b 2d |.7#W..m....]...-|
00000010 f0 5a 68 f9 0f 7d 12 06 18 c9 b2 b4 48 e6 3d ce |.Zh..}......H.=.|
[33f3 01-03 17:55:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 58 65 b4 e2 bb 1d a5 07 69 3b |0E.!..Xe......i;|
00000010 60 cf 1c 97 c9 b2 55 fe 3d 0b 20 55 2a 49 8a 73 |`.....U.=. U*I.s|
00000020 16 4d ee 50 1d 02 20 0e 23 68 4f e4 2e 90 16 18 |.M.P.. .#hO.....|
00000030 fa 42 bf ea 87 98 ba 80 4b 06 66 8c 1a 65 a9 b2 |.B......K.f..e..|
00000040 08 23 9c c1 c0 39 ae |.#...9.|
[33f4 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[33f5 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d06930 gate 1578074152990434600 evaluation starts
[33f6 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d06930 signed by 0 principal evaluation starts (used [false])
[33f7 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d06930 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[33f8 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d06930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[33f9 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d06930 principal evaluation fails
[33fa 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d06930 gate 1578074152990434600 evaluation fails
[33fb 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[33fc 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[33fd 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[33fe 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 37 23 57 f1 cb 6d c6 ba e0 fd 5d 10 07 0b 2d |.7#W..m....]...-|
00000010 f0 5a 68 f9 0f 7d 12 06 18 c9 b2 b4 48 e6 3d ce |.Zh..}......H.=.|
[33ff 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 58 65 b4 e2 bb 1d a5 07 69 3b |0E.!..Xe......i;|
00000010 60 cf 1c 97 c9 b2 55 fe 3d 0b 20 55 2a 49 8a 73 |`.....U.=. U*I.s|
00000020 16 4d ee 50 1d 02 20 0e 23 68 4f e4 2e 90 16 18 |.M.P.. .#hO.....|
00000030 fa 42 bf ea 87 98 ba 80 4b 06 66 8c 1a 65 a9 b2 |.B......K.f..e..|
00000040 08 23 9c c1 c0 39 ae |.#...9.|
[3400 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3401 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d07230 gate 1578074152994724100 evaluation starts
[3402 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d07230 signed by 0 principal evaluation starts (used [false])
[3403 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d07230 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3404 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d07230 principal evaluation succeeds for identity 0
[3405 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d07230 gate 1578074152994724100 evaluation succeeds
[3406 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3408 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3409 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[340a 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3407 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[340b 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[340c 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[340d 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}
[340e 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46
[340f 01-03 17:55:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46
[3410 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3411 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3412 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3413 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3414 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3415 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3416 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3417 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3418 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3419 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[341a 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[341b 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[341c 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[341d 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[341e 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[341f 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3420 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3421 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3422 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3423 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3424 01-03 17:55:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3425 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1882631156310146100 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3426 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:1882631156310146100 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3427 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1882631156310146100 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3428 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3429 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[342a 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[342b 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[342c 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[342d 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[342e 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[342f 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3430 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3431 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3432 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3433 01-03 17:55:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3434 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1379424835041283183 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3435 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:1379424835041283183 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3436 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1379424835041283183 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3437 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3438 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3439 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[343a 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[343b 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[343c 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[343d 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[343e 01-03 17:55:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[343f 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3440 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3441 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3442 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3443 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3444 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3445 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3446 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3447 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3448 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3449 01-03 17:55:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[344a 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[344b 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef d0 81 3a c1 82 65 b0 08 91 ad f3 6d b4 42 81 |...:..e.....m.B.|
00000010 f3 5a 17 de 44 50 88 07 f2 e8 33 89 bc a0 7f 4c |.Z..DP....3....L|
[344c 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c b6 c7 f7 0b 53 c2 02 82 fb 7e 83 |0D. ,....S....~.|
00000010 66 a5 08 6a 6a 21 2f 4a 7f cb 4a 57 e3 a3 3c c0 |f..jj!/J..JW..<.|
00000020 6d f7 81 3a 02 20 42 2e 35 9e 65 f4 18 e9 3e cb |m..:. B.5.e...>.|
00000030 df d7 fe a1 b6 d9 7d 82 4f 6c 2e 8d a8 49 8b e8 |......}.Ol...I..|
00000040 07 9b af 0a e4 42 |.....B|
[344d 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[344e 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d54720 gate 1578074153094727300 evaluation starts
[344f 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d54720 signed by 0 principal evaluation starts (used [false])
[3450 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d54720 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3451 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d54720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3452 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d54720 principal evaluation fails
[3453 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d54720 gate 1578074153094727300 evaluation fails
[3454 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3455 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3456 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3457 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef d0 81 3a c1 82 65 b0 08 91 ad f3 6d b4 42 81 |...:..e.....m.B.|
00000010 f3 5a 17 de 44 50 88 07 f2 e8 33 89 bc a0 7f 4c |.Z..DP....3....L|
[3458 01-03 17:55:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c b6 c7 f7 0b 53 c2 02 82 fb 7e 83 |0D. ,....S....~.|
00000010 66 a5 08 6a 6a 21 2f 4a 7f cb 4a 57 e3 a3 3c c0 |f..jj!/J..JW..<.|
00000020 6d f7 81 3a 02 20 42 2e 35 9e 65 f4 18 e9 3e cb |m..:. B.5.e...>.|
00000030 df d7 fe a1 b6 d9 7d 82 4f 6c 2e 8d a8 49 8b e8 |......}.Ol...I..|
00000040 07 9b af 0a e4 42 |.....B|
[3459 01-03 17:55:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[345a 01-03 17:55:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d55020 gate 1578074153104338800 evaluation starts
[345b 01-03 17:55:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d55020 signed by 0 principal evaluation starts (used [false])
[345c 01-03 17:55:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d55020 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[345d 01-03 17:55:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d55020 principal evaluation succeeds for identity 0
[345e 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d55020 gate 1578074153104338800 evaluation succeeds
[345f 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3460 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3461 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3462 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3463 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3464 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}
[3465 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48
[3466 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48
[3467 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3468 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3469 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[346a 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[346b 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[346c 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[346d 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[346e 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[346f 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3470 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3471 01-03 17:55:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3472 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3473 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3474 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3475 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3476 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3477 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3479 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3478 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 86 ff 1e e0 a0 ce 24 7b 24 b0 25 e3 ad a2 cc |_......${$.%....|
00000010 87 fc 09 0e fb 59 61 1c cc a0 89 20 6f c9 bb 55 |.....Ya.... o..U|
[347a 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 4d 1e d5 37 ea 92 3e 64 7b 07 c4 |0D. KM..7..>d{..|
00000010 8f 90 5d 58 30 0e ae 1a 96 a3 f0 63 f0 c0 1d 14 |..]X0......c....|
00000020 b9 fb fa 14 02 20 1e 6f 8f 99 9a a2 4d b5 b2 be |..... .o....M...|
00000030 5d 3a fd 83 78 bd 78 c6 d3 13 2e dc e4 12 4b 4a |]:..x.x.......KJ|
00000040 78 81 ab 03 8b 58 |x....X|
[347b 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[347c 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[347d 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[347e 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d15dd0 gate 1578074153124585000 evaluation starts
[347f 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d15dd0 signed by 0 principal evaluation starts (used [false])
[3481 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d15dd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3483 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d15dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3484 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d15dd0 principal evaluation fails
[3485 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d15dd0 gate 1578074153124585000 evaluation fails
[3480 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3486 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3489 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[348a 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3482 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3487 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[348b 01-03 17:55:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[348c 01-03 17:55:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 86 ff 1e e0 a0 ce 24 7b 24 b0 25 e3 ad a2 cc |_......${$.%....|
00000010 87 fc 09 0e fb 59 61 1c cc a0 89 20 6f c9 bb 55 |.....Ya.... o..U|
[348d 01-03 17:55:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 4d 1e d5 37 ea 92 3e 64 7b 07 c4 |0D. KM..7..>d{..|
00000010 8f 90 5d 58 30 0e ae 1a 96 a3 f0 63 f0 c0 1d 14 |..]X0......c....|
00000020 b9 fb fa 14 02 20 1e 6f 8f 99 9a a2 4d b5 b2 be |..... .o....M...|
00000030 5d 3a fd 83 78 bd 78 c6 d3 13 2e dc e4 12 4b 4a |]:..x.x.......KJ|
00000040 78 81 ab 03 8b 58 |x....X|
[348e 01-03 17:55:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[348f 01-03 17:55:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3490 01-03 17:55:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3491 01-03 17:55:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3488 01-03 17:55:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3492 01-03 17:55:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3493 01-03 17:55:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3494 01-03 17:55:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3495 01-03 17:55:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3496 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3497 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d7c6d0 gate 1578074153162332900 evaluation starts
[3498 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d7c6d0 signed by 0 principal evaluation starts (used [false])
[3499 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d7c6d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[349a 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d7c6d0 principal evaluation succeeds for identity 0
[349b 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d7c6d0 gate 1578074153162332900 evaluation succeeds
[349c 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[349d 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[349e 01-03 17:55:53.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[349f 01-03 17:55:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[34a0 01-03 17:55:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[34a1 01-03 17:55:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}
[34a2 01-03 17:55:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49
[34a3 01-03 17:55:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49
[34a4 01-03 17:55:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[34a5 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34a6 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34a7 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34a8 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[34a9 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34aa 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34ab 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34ac 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[34ad 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[34ae 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[34b1 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[34af 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34b2 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[34b3 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34b0 01-03 17:55:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34b4 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[34b5 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[34b6 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[34b7 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[34b8 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[34b9 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[34ba 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 79 85 f2 7d 8d c0 b4 46 5d 3a a5 26 bd a1 dc |.y..}...F]:.&...|
00000010 4f 9e e5 6a 65 55 2d 2a e6 0d 24 d5 76 1f f7 5f |O..jeU-*..$.v.._|
[34bb 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 31 d2 9b 48 88 7e 92 e9 53 a1 fd |0D. .1..H.~..S..|
00000010 10 88 98 5b bb bf 0b 6a 2a 65 b4 10 78 8d d2 37 |...[...j*e..x..7|
00000020 b5 e8 84 a7 02 20 01 10 39 16 9b 56 af 01 e8 4f |..... ..9..V...O|
00000030 c0 f7 c9 42 c2 bf cf ad c2 07 fc c5 3a 82 db 77 |...B........:..w|
00000040 e2 03 b5 3a e5 c0 |...:..|
[34bc 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[34bd 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dacb90 gate 1578074153198150600 evaluation starts
[34be 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dacb90 signed by 0 principal evaluation starts (used [false])
[34bf 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dacb90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[34c0 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dacb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[34c1 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dacb90 principal evaluation fails
[34c2 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dacb90 gate 1578074153198150600 evaluation fails
[34c3 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[34c4 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[34c5 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[34c6 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 79 85 f2 7d 8d c0 b4 46 5d 3a a5 26 bd a1 dc |.y..}...F]:.&...|
00000010 4f 9e e5 6a 65 55 2d 2a e6 0d 24 d5 76 1f f7 5f |O..jeU-*..$.v.._|
[34c7 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 31 d2 9b 48 88 7e 92 e9 53 a1 fd |0D. .1..H.~..S..|
00000010 10 88 98 5b bb bf 0b 6a 2a 65 b4 10 78 8d d2 37 |...[...j*e..x..7|
00000020 b5 e8 84 a7 02 20 01 10 39 16 9b 56 af 01 e8 4f |..... ..9..V...O|
00000030 c0 f7 c9 42 c2 bf cf ad c2 07 fc c5 3a 82 db 77 |...B........:..w|
00000040 e2 03 b5 3a e5 c0 |...:..|
[34c8 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[34c9 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dad490 gate 1578074153199561300 evaluation starts
[34ca 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dad490 signed by 0 principal evaluation starts (used [false])
[34cb 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dad490 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[34cc 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dad490 principal evaluation succeeds for identity 0
[34cd 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005dad490 gate 1578074153199561300 evaluation succeeds
[34ce 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[34cf 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[34d0 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[34d1 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[34d2 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[34d3 01-03 17:55:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}
[34d4 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47
[34d5 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47
[34d6 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[34d7 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34d8 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34d9 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34da 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[34db 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34dc 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34dd 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34de 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[34df 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[34e0 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[34e1 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34e2 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34e3 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34e4 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34e5 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34e6 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34e7 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34e8 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34e9 01-03 17:55:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34ea 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[34eb 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7504662115408422827 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[34ec 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[34ed 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11554148266293413330 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[34ee 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[34ef 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13271340213587693389 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[34f0 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13271340213587693389 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[34f1 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34f2 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7504662115408422827 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[34f3 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11554148266293413330 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[34f4 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34f5 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34f6 01-03 17:55:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315102D
[34f8 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11554148266293413330 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[34f9 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F05543374CCD6F337F498E0BE137DC398C0C630B9B6C35C57DB63B2042FF5274
[34fa 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[34fb 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[34fc 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[34f7 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7504662115408422827 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[34fd 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7504662115408422827 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[34fe 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34ff 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11554148266293413330 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3500 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11554148266293413330 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3501 01-03 17:55:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3502 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13271340213587693389 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3503 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13271340213587693389 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3504 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13271340213587693389 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3505 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3506 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3507 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3508 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[3509 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[350a 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[350b 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[350c 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[350d 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes
[350e 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[350f 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3510 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3511 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes
[3512 01-03 17:55:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3513 01-03 17:55:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315102E
[3514 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6CE7C1A43885FCF35880874BC51E562DB3DBBBCDE3BC582F60E37337D523EDAE
[3515 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3516 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3517 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3518 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[3519 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[351a 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[351b 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[351c 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[351d 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3520 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[3521 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[351f 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[351e 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3522 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[3523 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3524 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[3525 01-03 17:55:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3526 01-03 17:55:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e7 c1 a4 38 85 fc f3 58 80 87 4b c5 1e 56 2d |l...8...X..K..V-|
00000010 b3 db bb cd e3 bc 58 2f 60 e3 73 37 d5 23 ed ae |......X/`.s7.#..|
[3527 01-03 17:55:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 c2 f6 ed ff 85 4f 3c 4b 17 41 |0E.!.......O<K.A|
00000010 b3 31 24 ee 0a ff de b8 24 d1 df 53 97 62 65 94 |.1$.....$..S.be.|
00000020 5b 12 d6 44 7e 02 20 2e f3 16 21 c0 45 fd 27 27 |[..D~. ...!.E.''|
00000030 2d c8 43 18 b8 29 2c 24 2e f3 12 ce 19 46 d7 d9 |-.C..),$.....F..|
00000040 09 3b 78 c1 37 06 37 |.;x.7.7|
[3528 01-03 17:55:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3529 01-03 17:55:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 f1 87 32 9f cb 6b 3d 43 7c dd |0E.!....2..k=C|.|
00000010 66 9b 2d 18 74 d8 dd 27 6e e5 12 02 49 92 98 41 |f.-.t..'n...I..A|
00000020 95 ac 71 d8 5d 02 20 71 87 ca 0a 8d e0 b1 b0 12 |..q.]. q........|
00000030 a7 2d 1b fb 5f 09 2c 75 99 67 52 ca 5e 25 24 99 |.-.._.,u.gR.^%$.|
00000040 8d 7a 9a a8 86 05 c8 |.z.....|
[352a 01-03 17:55:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[352b 01-03 17:55:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[352c 01-03 17:55:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[352d 01-03 17:55:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[352e 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[352f 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3530 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3531 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3532 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3533 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3534 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3535 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3536 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3537 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3538 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3539 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[353a 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 79 85 f2 7d 8d c0 b4 46 5d 3a a5 26 bd a1 dc |.y..}...F]:.&...|
00000010 4f 9e e5 6a 65 55 2d 2a e6 0d 24 d5 76 1f f7 5f |O..jeU-*..$.v.._|
[353b 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 31 d2 9b 48 88 7e 92 e9 53 a1 fd |0D. .1..H.~..S..|
00000010 10 88 98 5b bb bf 0b 6a 2a 65 b4 10 78 8d d2 37 |...[...j*e..x..7|
00000020 b5 e8 84 a7 02 20 01 10 39 16 9b 56 af 01 e8 4f |..... ..9..V...O|
00000030 c0 f7 c9 42 c2 bf cf ad c2 07 fc c5 3a 82 db 77 |...B........:..w|
00000040 e2 03 b5 3a e5 c0 |...:..|
[353c 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[353d 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e0b710 gate 1578074153346885100 evaluation starts
[353e 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e0b710 signed by 0 principal evaluation starts (used [false])
[353f 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e0b710 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3540 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e0b710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3541 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e0b710 principal evaluation fails
[3542 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e0b710 gate 1578074153346885100 evaluation fails
[3543 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3544 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3545 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3546 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 79 85 f2 7d 8d c0 b4 46 5d 3a a5 26 bd a1 dc |.y..}...F]:.&...|
00000010 4f 9e e5 6a 65 55 2d 2a e6 0d 24 d5 76 1f f7 5f |O..jeU-*..$.v.._|
[3547 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 31 d2 9b 48 88 7e 92 e9 53 a1 fd |0D. .1..H.~..S..|
00000010 10 88 98 5b bb bf 0b 6a 2a 65 b4 10 78 8d d2 37 |...[...j*e..x..7|
00000020 b5 e8 84 a7 02 20 01 10 39 16 9b 56 af 01 e8 4f |..... ..9..V...O|
00000030 c0 f7 c9 42 c2 bf cf ad c2 07 fc c5 3a 82 db 77 |...B........:..w|
00000040 e2 03 b5 3a e5 c0 |...:..|
[3548 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3549 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e1e010 gate 1578074153349097000 evaluation starts
[354a 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e1e010 signed by 0 principal evaluation starts (used [false])
[354b 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e1e010 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[354c 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e1e010 principal evaluation succeeds for identity 0
[354d 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e1e010 gate 1578074153349097000 evaluation succeeds
[354e 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[354f 01-03 17:55:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3550 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3551 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3552 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[3553 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3554 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3555 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e7 c1 a4 38 85 fc f3 58 80 87 4b c5 1e 56 2d |l...8...X..K..V-|
00000010 b3 db bb cd e3 bc 58 2f 60 e3 73 37 d5 23 ed ae |......X/`.s7.#..|
[3556 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 c2 f6 ed ff 85 4f 3c 4b 17 41 |0E.!.......O<K.A|
00000010 b3 31 24 ee 0a ff de b8 24 d1 df 53 97 62 65 94 |.1$.....$..S.be.|
00000020 5b 12 d6 44 7e 02 20 2e f3 16 21 c0 45 fd 27 27 |[..D~. ...!.E.''|
00000030 2d c8 43 18 b8 29 2c 24 2e f3 12 ce 19 46 d7 d9 |-.C..),$.....F..|
00000040 09 3b 78 c1 37 06 37 |.;x.7.7|
[3557 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3558 01-03 17:55:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3559 01-03 17:55:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[355a 01-03 17:55:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[355b 01-03 17:55:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 18 f8 14 e0 52 a6 76 85 b7 8b ce 9b 93 01 60 |J....R.v.......`|
00000010 c8 51 ed ae a4 86 d3 b7 2e 83 71 30 9b 9c 7f 43 |.Q........q0...C|
[355c 01-03 17:55:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 d4 07 cf 68 bb 6c a8 35 9e bc 5e |0D. ....h.l.5..^|
00000010 17 25 36 51 f4 82 da 12 ab bc 6b ea 48 c6 d5 10 |.%6Q......k.H...|
00000020 74 e3 d8 c6 02 20 6c 71 cf b8 59 64 de 80 0e 6c |t.... lq..Yd...l|
00000030 57 b3 51 bb 62 86 17 c1 85 7d cb 31 5c cd d3 ea |W.Q.b....}.1\...|
00000040 e9 a6 33 21 7f 0b |..3!..|
[355d 01-03 17:55:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[355e 01-03 17:55:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[355f 01-03 17:55:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3560 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3561 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3562 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3563 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3564 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3565 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 18 f8 14 e0 52 a6 76 85 b7 8b ce 9b 93 01 60 |J....R.v.......`|
00000010 c8 51 ed ae a4 86 d3 b7 2e 83 71 30 9b 9c 7f 43 |.Q........q0...C|
[3566 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 d4 07 cf 68 bb 6c a8 35 9e bc 5e |0D. ....h.l.5..^|
00000010 17 25 36 51 f4 82 da 12 ab bc 6b ea 48 c6 d5 10 |.%6Q......k.H...|
00000020 74 e3 d8 c6 02 20 6c 71 cf b8 59 64 de 80 0e 6c |t.... lq..Yd...l|
00000030 57 b3 51 bb 62 86 17 c1 85 7d cb 31 5c cd d3 ea |W.Q.b....}.1\...|
00000040 e9 a6 33 21 7f 0b |..3!..|
[3567 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3568 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3569 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[356a 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e7 c1 a4 38 85 fc f3 58 80 87 4b c5 1e 56 2d |l...8...X..K..V-|
00000010 b3 db bb cd e3 bc 58 2f 60 e3 73 37 d5 23 ed ae |......X/`.s7.#..|
[356b 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 c2 f6 ed ff 85 4f 3c 4b 17 41 |0E.!.......O<K.A|
00000010 b3 31 24 ee 0a ff de b8 24 d1 df 53 97 62 65 94 |.1$.....$..S.be.|
00000020 5b 12 d6 44 7e 02 20 2e f3 16 21 c0 45 fd 27 27 |[..D~. ...!.E.''|
00000030 2d c8 43 18 b8 29 2c 24 2e f3 12 ce 19 46 d7 d9 |-.C..),$.....F..|
00000040 09 3b 78 c1 37 06 37 |.;x.7.7|
[356c 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[356d 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[356e 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[356f 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3570 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3571 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3572 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3573 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3574 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3575 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3576 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3577 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 86 ff 1e e0 a0 ce 24 7b 24 b0 25 e3 ad a2 cc |_......${$.%....|
00000010 87 fc 09 0e fb 59 61 1c cc a0 89 20 6f c9 bb 55 |.....Ya.... o..U|
[3578 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 4d 1e d5 37 ea 92 3e 64 7b 07 c4 |0D. KM..7..>d{..|
00000010 8f 90 5d 58 30 0e ae 1a 96 a3 f0 63 f0 c0 1d 14 |..]X0......c....|
00000020 b9 fb fa 14 02 20 1e 6f 8f 99 9a a2 4d b5 b2 be |..... .o....M...|
00000030 5d 3a fd 83 78 bd 78 c6 d3 13 2e dc e4 12 4b 4a |]:..x.x.......KJ|
00000040 78 81 ab 03 8b 58 |x....X|
[3579 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[357a 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e56990 gate 1578074153396867900 evaluation starts
[357b 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e56990 signed by 0 principal evaluation starts (used [false])
[357c 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e56990 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[357d 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e56990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[357e 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e56990 principal evaluation fails
[357f 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e56990 gate 1578074153396867900 evaluation fails
[3580 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3581 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3582 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3583 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 86 ff 1e e0 a0 ce 24 7b 24 b0 25 e3 ad a2 cc |_......${$.%....|
00000010 87 fc 09 0e fb 59 61 1c cc a0 89 20 6f c9 bb 55 |.....Ya.... o..U|
[3584 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 4d 1e d5 37 ea 92 3e 64 7b 07 c4 |0D. KM..7..>d{..|
00000010 8f 90 5d 58 30 0e ae 1a 96 a3 f0 63 f0 c0 1d 14 |..]X0......c....|
00000020 b9 fb fa 14 02 20 1e 6f 8f 99 9a a2 4d b5 b2 be |..... .o....M...|
00000030 5d 3a fd 83 78 bd 78 c6 d3 13 2e dc e4 12 4b 4a |]:..x.x.......KJ|
00000040 78 81 ab 03 8b 58 |x....X|
[3585 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3586 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e57290 gate 1578074153399260100 evaluation starts
[3587 01-03 17:55:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e57290 signed by 0 principal evaluation starts (used [false])
[3588 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e57290 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3589 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e57290 principal evaluation succeeds for identity 0
[358a 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e57290 gate 1578074153399260100 evaluation succeeds
[358b 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[358c 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[358d 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[358e 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[358f 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3590 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3591 01-03 17:55:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3592 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3593 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3594 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[3595 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3597 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3598 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3596 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3599 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[359a 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[359b 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[359c 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[359d 01-03 17:55:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[359e 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[359f 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35a0 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[35a1 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[35a2 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[35a3 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[35a4 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[35a5 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[35a6 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[35a7 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[35a8 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35a9 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e6fa00 gate 1578074153451833400 evaluation starts
[35aa 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e6fa00 signed by 0 principal evaluation starts (used [false])
[35ab 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e6fa00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[35ac 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e6fa00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[35ad 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e6fa00 principal evaluation fails
[35ae 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e6fa00 gate 1578074153451833400 evaluation fails
[35af 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[35b0 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[35b1 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[35b2 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[35b3 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[35b4 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35b5 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e86300 gate 1578074153454256100 evaluation starts
[35b6 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e86300 signed by 0 principal evaluation starts (used [false])
[35b7 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e86300 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[35b8 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e86300 principal evaluation succeeds for identity 0
[35b9 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005e86300 gate 1578074153454256100 evaluation succeeds
[35ba 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[35bb 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[35bc 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[35bd 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[35be 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[35bf 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[35c0 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[35c1 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[35c2 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35c3 01-03 17:55:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35c4 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[35c5 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[35c6 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[35c7 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[35c8 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[35c9 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[35ca 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[35cb 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[35cc 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[35cd 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35ce 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea8bf0 gate 1578074153466092200 evaluation starts
[35cf 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea8bf0 signed by 0 principal evaluation starts (used [false])
[35d0 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea8bf0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[35d1 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea8bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[35d2 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea8bf0 principal evaluation fails
[35d3 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea8bf0 gate 1578074153466092200 evaluation fails
[35d4 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[35d5 01-03 17:55:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[35d6 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[35d7 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[35d8 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[35d9 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35da 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea94f0 gate 1578074153472909600 evaluation starts
[35db 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea94f0 signed by 0 principal evaluation starts (used [false])
[35dc 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea94f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[35dd 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea94f0 principal evaluation succeeds for identity 0
[35de 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ea94f0 gate 1578074153472909600 evaluation succeeds
[35df 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[35e0 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[35e1 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[35e2 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[35e3 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35e4 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[35e5 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35e6 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35e7 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35e8 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[35e9 01-03 17:55:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[35ea 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[35eb 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[35ec 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[35ed 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[35ee 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[35ef 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[35f0 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35f1 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3200 gate 1578074153481342200 evaluation starts
[35f2 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3200 signed by 0 principal evaluation starts (used [false])
[35f3 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3200 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[35f4 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[35f5 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3200 principal evaluation fails
[35f6 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3200 gate 1578074153481342200 evaluation fails
[35f7 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[35f8 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[35f9 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[35fa 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[35fb 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[35fc 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35fd 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3b00 gate 1578074153482718200 evaluation starts
[35fe 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3b00 signed by 0 principal evaluation starts (used [false])
[35ff 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3b00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3600 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3b00 principal evaluation succeeds for identity 0
[3601 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ec3b00 gate 1578074153482718200 evaluation succeeds
[3602 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3603 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3604 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3605 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3606 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3607 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3608 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3609 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[360a 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[360b 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[360c 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[360d 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[360e 01-03 17:55:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[360f 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3610 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3611 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3612 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3613 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006adbc10 gate 1578074153490427000 evaluation starts
[3614 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006adbc10 signed by 0 principal evaluation starts (used [false])
[3615 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006adbc10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3616 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006adbc10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3617 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006adbc10 principal evaluation fails
[3618 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006adbc10 gate 1578074153490427000 evaluation fails
[3619 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[361a 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[361b 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[361c 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[361d 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[361e 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[361f 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007efc510 gate 1578074153494753000 evaluation starts
[3620 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007efc510 signed by 0 principal evaluation starts (used [false])
[3621 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007efc510 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3622 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007efc510 principal evaluation succeeds for identity 0
[3623 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007efc510 gate 1578074153494753000 evaluation succeeds
[3624 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3625 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3626 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3627 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3628 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3629 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[362a 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[362b 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[362c 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[362d 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[362e 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[362f 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3630 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3631 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3632 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3633 01-03 17:55:53.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3634 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3635 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3636 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3637 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3638 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3639 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[363a 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[363b 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17560 gate 1578074153500385600 evaluation starts
[363c 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17560 signed by 0 principal evaluation starts (used [false])
[363d 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17560 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[363e 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[363f 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17560 principal evaluation fails
[3640 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17560 gate 1578074153500385600 evaluation fails
[3641 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3642 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3643 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3644 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3645 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3646 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3647 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17e60 gate 1578074153505938300 evaluation starts
[3648 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17e60 signed by 0 principal evaluation starts (used [false])
[3649 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17e60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[364a 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17e60 principal evaluation succeeds for identity 0
[364b 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f17e60 gate 1578074153505938300 evaluation succeeds
[364c 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[364d 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[364e 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[364f 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3650 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3651 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3652 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3653 01-03 17:55:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3654 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3655 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3656 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3657 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3658 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3659 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[365a 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[365b 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f258c0 gate 1578074153513100100 evaluation starts
[365c 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f258c0 signed by 0 principal evaluation starts (used [false])
[365d 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f258c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[365e 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f258c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[365f 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f258c0 principal evaluation fails
[3660 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f258c0 gate 1578074153513100100 evaluation fails
[3661 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3662 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3663 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3664 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3665 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3666 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3667 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f3e1c0 gate 1578074153518577900 evaluation starts
[3668 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f3e1c0 signed by 0 principal evaluation starts (used [false])
[3669 01-03 17:55:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f3e1c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[366a 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f3e1c0 principal evaluation succeeds for identity 0
[366b 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007f3e1c0 gate 1578074153518577900 evaluation succeeds
[366c 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[366d 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[366e 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[366f 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3670 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3671 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3672 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3673 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[3674 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3675 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3676 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17949704853518832525 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[3677 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17949704853518832525 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3678 01-03 17:55:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3679 01-03 17:55:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17949704853518832525 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[367a 01-03 17:55:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17949704853518832525 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[367b 01-03 17:55:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[367c 01-03 17:55:53.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[367d 01-03 17:55:53.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[367e 01-03 17:55:53.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[367f 01-03 17:55:53.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3680 01-03 17:55:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13399950306301013575 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3681 01-03 17:55:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13399950306301013575 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3682 01-03 17:55:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3683 01-03 17:55:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3684 01-03 17:55:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3685 01-03 17:55:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3686 01-03 17:55:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3687 01-03 17:55:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3688 01-03 17:55:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3689 01-03 17:55:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[368a 01-03 17:55:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[368b 01-03 17:55:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[368c 01-03 17:55:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[368d 01-03 17:55:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[368e 01-03 17:55:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[368f 01-03 17:55:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3690 01-03 17:55:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:1427779204255072430 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3691 01-03 17:55:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1427779204255072430 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3692 01-03 17:55:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3693 01-03 17:55:55.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3694 01-03 17:55:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[3695 01-03 17:55:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3696 01-03 17:55:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[3697 01-03 17:55:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3698 01-03 17:55:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 46 ec 22 1b 91 9b 3f 06 11 93 13 de fb 05 cf |bF."...?........|
00000010 09 f2 1d 86 32 59 da be e7 68 c6 f4 eb a5 d5 7f |....2Y...h......|
[3699 01-03 17:55:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 68 ec 04 48 5e 12 c9 ea b3 d0 0c |0D. .h..H^......|
00000010 a5 b8 cf 75 23 d7 37 16 8d 27 94 11 df e1 14 9e |...u#.7..'......|
00000020 4d ac 29 93 02 20 3f 8d 69 16 b3 c7 f4 09 79 62 |M.).. ?.i.....yb|
00000030 a2 98 db c4 e5 1f e2 7c 0a 81 3b b5 bc 0d b5 98 |.......|..;.....|
00000040 0b 63 eb 3b 65 07 |.c.;e.|
[369a 01-03 17:55:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[369b 01-03 17:55:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 97 39 ab 10 d8 06 17 c9 8b 58 df |0D. =.9.......X.|
00000010 29 44 99 9e c7 76 01 c2 68 0f 95 c7 93 92 4f 13 |)D...v..h.....O.|
00000020 c9 a3 a7 45 02 20 08 8e 87 98 b9 db eb 95 ef f1 |...E. ..........|
00000030 26 34 ca 08 4e 9c 03 8f 19 66 08 4e 8f 04 ed 7d |&4..N....f.N...}|
00000040 fe cd 59 e2 26 3b |..Y.&;|
[369c 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[369d 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[369e 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:50
[369f 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:50
[36a0 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[36a1 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36a2 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36a3 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36a4 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[36a5 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36a6 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36a7 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[36a8 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[36a9 01-03 17:55:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[36aa 01-03 17:55:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36ab 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[36ac 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[36ad 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315100F1801
[36ae 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4A302A6DC25071D67847CDB59FC5529598E032097B1D347B87E0C8FBAA6E6596
[36af 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[36b0 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36b1 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36b2 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36b3 01-03 17:55:56.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36b4 01-03 17:55:56.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[36b5 01-03 17:55:56.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36b6 01-03 17:55:56.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[36b8 01-03 17:55:56.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36b7 01-03 17:55:56.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36b9 01-03 17:55:56.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[36ba 01-03 17:55:56.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36bb 01-03 17:55:56.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[36bc 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[36bd 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 37 23 64 eb 1c b1 55 dd 92 3e b2 84 73 38 db |.7#d...U..>..s8.|
00000010 64 6c 50 6e d8 50 63 29 0f 34 f3 ad 23 06 79 b1 |dlPn.Pc).4..#.y.|
[36be 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d 15 49 5d be fb cf db 88 96 37 00 |0D. -.I]......7.|
00000010 42 1b 47 be b1 5a f6 43 20 1f 6b 23 62 39 6b 65 |B.G..Z.C .k#b9ke|
00000020 44 cd 19 77 02 20 5b 7a d6 8c f8 72 fd 04 c9 aa |D..w. [z...r....|
00000030 dc 02 3a 9c 90 88 3e 47 4d 51 a7 5e b0 7f f0 45 |..:...>GMQ.^...E|
00000040 65 55 7b fa 63 6e |eU{.cn|
[36bf 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[36c0 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 37 f7 d7 ea b9 04 de 09 d3 ad 83 |0D. d7..........|
00000010 41 2e 71 64 68 2c 09 a2 78 fa 17 95 52 a1 c8 99 |A.qdh,..x...R...|
00000020 20 5f a3 4d 02 20 44 41 af f2 6d 2d 47 58 56 52 | _.M. DA..m-GXVR|
00000030 d8 f8 4b 7b f6 ac 97 26 72 27 a9 4a 20 b9 2c c2 |..K{...&r'.J .,.|
00000040 6e 80 8a df 17 c9 |n.....|
[36c1 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[36c2 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[36c3 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51
[36c4 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51
[36c5 01-03 17:55:56.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[36c6 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36c7 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36c8 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36c9 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36ca 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36cb 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36cc 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[36cd 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36cf 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[36d0 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36ce 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[36d1 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[36d2 01-03 17:55:56.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36d3 01-03 17:55:56.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[36d4 01-03 17:55:56.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[36d5 01-03 17:55:56.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36d6 01-03 17:55:56.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[36d7 01-03 17:55:56.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36d8 01-03 17:55:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[36d9 01-03 17:55:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[36da 01-03 17:55:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36db 01-03 17:55:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[36dc 01-03 17:55:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36dd 01-03 17:55:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:10781380866191706152 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[36de 01-03 17:55:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:10781380866191706152 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[36df 01-03 17:55:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10781380866191706152 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[36e0 01-03 17:55:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36e1 01-03 17:55:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36e2 01-03 17:55:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36e3 01-03 17:55:57.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36e4 01-03 17:55:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36e5 01-03 17:55:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36e6 01-03 17:55:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[36e7 01-03 17:55:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36e8 01-03 17:55:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:10740077868653622790 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[36e9 01-03 17:55:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:10740077868653622790 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[36ea 01-03 17:55:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10740077868653622790 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[36eb 01-03 17:55:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36ec 01-03 17:55:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36ed 01-03 17:55:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36ee 01-03 17:55:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36ef 01-03 17:55:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36f0 01-03 17:55:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36f1 01-03 17:55:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[36f2 01-03 17:55:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36f3 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[36f4 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[36f5 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[36f6 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[36f7 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36f8 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36f9 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[36fa 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[36fb 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[36fc 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[36fd 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[36fe 01-03 17:55:57.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[36ff 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 22 69 2c 5f 42 8b 03 57 69 49 ad d9 a6 b1 0c |."i,_B..WiI.....|
00000010 95 e7 9c e2 29 3d b8 dc 72 2c 9e 6b d9 83 86 09 |....)=..r,.k....|
[3700 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e 7c 06 75 84 f6 ac c0 60 8b fe 60 |0D. n|.u....`..`|
00000010 3b ba 79 44 28 a1 7b 78 65 91 3c 7c 36 f2 16 16 |;.yD(.{xe.<|6...|
00000020 b3 85 b7 af 02 20 01 9f a6 0d 8c 07 29 a3 c4 00 |..... ......)...|
00000030 81 78 62 a6 65 24 dd f7 68 20 c2 3a 33 7e de 3f |.xb.e$..h .:3~.?|
00000040 c0 ce 4a 29 7e 4f |..J)~O|
[3701 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3702 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fafe60 gate 1578074157122822300 evaluation starts
[3703 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fafe60 signed by 0 principal evaluation starts (used [false])
[3704 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fafe60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3705 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fafe60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3706 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fafe60 principal evaluation fails
[3707 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fafe60 gate 1578074157122822300 evaluation fails
[3708 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3709 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[370a 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[370b 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 22 69 2c 5f 42 8b 03 57 69 49 ad d9 a6 b1 0c |."i,_B..WiI.....|
00000010 95 e7 9c e2 29 3d b8 dc 72 2c 9e 6b d9 83 86 09 |....)=..r,.k....|
[370c 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e 7c 06 75 84 f6 ac c0 60 8b fe 60 |0D. n|.u....`..`|
00000010 3b ba 79 44 28 a1 7b 78 65 91 3c 7c 36 f2 16 16 |;.yD(.{xe.<|6...|
00000020 b3 85 b7 af 02 20 01 9f a6 0d 8c 07 29 a3 c4 00 |..... ......)...|
00000030 81 78 62 a6 65 24 dd f7 68 20 c2 3a 33 7e de 3f |.xb.e$..h .:3~.?|
00000040 c0 ce 4a 29 7e 4f |..J)~O|
[370d 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[370e 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fe2760 gate 1578074157128193000 evaluation starts
[370f 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fe2760 signed by 0 principal evaluation starts (used [false])
[3710 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fe2760 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3711 01-03 17:55:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fe2760 principal evaluation succeeds for identity 0
[3712 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007fe2760 gate 1578074157128193000 evaluation succeeds
[3713 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3714 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3715 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3716 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3717 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3718 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3719 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[371a 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}
[371b 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50
[371c 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50
[371d 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[371e 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[371f 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3720 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3721 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3722 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[3723 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3724 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3725 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3726 01-03 17:55:57.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3727 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3728 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[3729 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[372a 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[372b 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[372c 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[372d 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[372e 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[372f 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3730 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3731 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3732 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3733 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 5c d9 ee 79 f9 b7 da c1 81 53 3a c8 2a ad 49 |.\..y.....S:.*.I|
00000010 c1 ae 66 da b1 f7 c8 1e 7d 4b 8e c2 10 e7 bc 76 |..f.....}K.....v|
[3734 01-03 17:55:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 0a 95 9a 55 29 58 4e 53 21 19 |0E.!.....U)XNS!.|
00000010 5d 57 41 dc 08 95 26 47 be 05 09 8b 80 53 4e 71 |]WA...&G.....SNq|
00000020 96 da 2c fd 93 02 20 1e 70 e7 36 a2 be 5a ed a8 |..,... .p.6..Z..|
00000030 de 4f 67 2d ac 6d e8 bf 7d 3d 3c 12 35 0c 22 8d |.Og-.m..}=<.5.".|
00000040 c1 cb f8 12 ec 5d 3b |.....];|
[3735 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3736 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffab30 gate 1578074157153662700 evaluation starts
[3737 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffab30 signed by 0 principal evaluation starts (used [false])
[3738 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffab30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3739 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffab30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[373a 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffab30 principal evaluation fails
[373b 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffab30 gate 1578074157153662700 evaluation fails
[373c 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[373d 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[373e 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[373f 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 5c d9 ee 79 f9 b7 da c1 81 53 3a c8 2a ad 49 |.\..y.....S:.*.I|
00000010 c1 ae 66 da b1 f7 c8 1e 7d 4b 8e c2 10 e7 bc 76 |..f.....}K.....v|
[3740 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 0a 95 9a 55 29 58 4e 53 21 19 |0E.!.....U)XNS!.|
00000010 5d 57 41 dc 08 95 26 47 be 05 09 8b 80 53 4e 71 |]WA...&G.....SNq|
00000020 96 da 2c fd 93 02 20 1e 70 e7 36 a2 be 5a ed a8 |..,... .p.6..Z..|
00000030 de 4f 67 2d ac 6d e8 bf 7d 3d 3c 12 35 0c 22 8d |.Og-.m..}=<.5.".|
00000040 c1 cb f8 12 ec 5d 3b |.....];|
[3741 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3742 01-03 17:55:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffb430 gate 1578074157159565300 evaluation starts
[3743 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffb430 signed by 0 principal evaluation starts (used [false])
[3744 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffb430 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3745 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffb430 principal evaluation succeeds for identity 0
[3746 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc007ffb430 gate 1578074157159565300 evaluation succeeds
[3747 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3748 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3749 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[374a 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[374b 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[374c 01-03 17:55:57.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes]}
[374d 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48
[374e 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48
[374f 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3750 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3751 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3752 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3753 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[3754 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3755 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3756 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3757 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[3758 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3759 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[375a 01-03 17:55:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[375b 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[375c 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7116246799303683978 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[375d 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[375e 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5952564774992236833 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[375f 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3760 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:837421931189445663 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3761 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7116246799303683978 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3763 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5952564774992236833 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3765 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3764 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3762 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:837421931189445663 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3766 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3767 01-03 17:55:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7116246799303683978 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[3768 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7116246799303683978 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[3769 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[376a 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 837421931189445663 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[376b 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 837421931189445663 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[376c 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 837421931189445663 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[376d 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[376e 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5952564774992236833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[376f 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5952564774992236833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[3770 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5952564774992236833 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[3771 01-03 17:55:57.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3772 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315102F
[3773 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A8580EEA34A00C690C997BD8DFFCBB01690AE1B39BE3C23ACE1E01EB7F1429E8
[3774 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3775 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3776 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3777 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[3778 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[377a 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[3779 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[377b 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[377c 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[377d 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[377e 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[377f 01-03 17:55:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[3780 01-03 17:55:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3781 01-03 17:55:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3782 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3783 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3784 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3785 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3786 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3787 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3788 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3789 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[378a 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[378b 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[378c 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[378d 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 5c d9 ee 79 f9 b7 da c1 81 53 3a c8 2a ad 49 |.\..y.....S:.*.I|
00000010 c1 ae 66 da b1 f7 c8 1e 7d 4b 8e c2 10 e7 bc 76 |..f.....}K.....v|
[378e 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 0a 95 9a 55 29 58 4e 53 21 19 |0E.!.....U)XNS!.|
00000010 5d 57 41 dc 08 95 26 47 be 05 09 8b 80 53 4e 71 |]WA...&G.....SNq|
00000020 96 da 2c fd 93 02 20 1e 70 e7 36 a2 be 5a ed a8 |..,... .p.6..Z..|
00000030 de 4f 67 2d ac 6d e8 bf 7d 3d 3c 12 35 0c 22 8d |.Og-.m..}=<.5.".|
00000040 c1 cb f8 12 ec 5d 3b |.....];|
[378f 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3790 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804abc0 gate 1578074157318510800 evaluation starts
[3791 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804abc0 signed by 0 principal evaluation starts (used [false])
[3792 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804abc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3793 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3794 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3795 01-03 17:55:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804abc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3796 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804abc0 principal evaluation fails
[3797 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804abc0 gate 1578074157318510800 evaluation fails
[3798 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3799 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[379a 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[379b 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 5c d9 ee 79 f9 b7 da c1 81 53 3a c8 2a ad 49 |.\..y.....S:.*.I|
00000010 c1 ae 66 da b1 f7 c8 1e 7d 4b 8e c2 10 e7 bc 76 |..f.....}K.....v|
[379c 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 0a 95 9a 55 29 58 4e 53 21 19 |0E.!.....U)XNS!.|
00000010 5d 57 41 dc 08 95 26 47 be 05 09 8b 80 53 4e 71 |]WA...&G.....SNq|
00000020 96 da 2c fd 93 02 20 1e 70 e7 36 a2 be 5a ed a8 |..,... .p.6..Z..|
00000030 de 4f 67 2d ac 6d e8 bf 7d 3d 3c 12 35 0c 22 8d |.Og-.m..}=<.5.".|
00000040 c1 cb f8 12 ec 5d 3b |.....];|
[379d 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[379e 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804b4c0 gate 1578074157320976700 evaluation starts
[379f 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804b4c0 signed by 0 principal evaluation starts (used [false])
[37a0 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804b4c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[37a1 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804b4c0 principal evaluation succeeds for identity 0
[37a2 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00804b4c0 gate 1578074157320976700 evaluation succeeds
[37a3 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[37a4 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[37a5 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[37a6 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[37a7 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[37a8 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37a9 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[37aa 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 58 0e ea 34 a0 0c 69 0c 99 7b d8 df fc bb 01 |.X..4..i..{.....|
00000010 69 0a e1 b3 9b e3 c2 3a ce 1e 01 eb 7f 14 29 e8 |i......:......).|
[37ab 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 41 9d 9a 16 e9 4b 0d ba 4a 79 |0E.!..A....K..Jy|
00000010 ab 84 90 a6 ab 11 0c 7d 2d 87 8c bb b2 70 75 13 |.......}-....pu.|
00000020 75 3e c6 ad 9e 02 20 66 c8 1c 67 34 c3 be 9b 4a |u>.... f..g4...J|
00000030 a1 52 8d 38 c0 c5 75 55 5e f8 cd ba ca ff e4 54 |.R.8..uU^......T|
00000040 0e 2e 77 58 4f e7 b1 |..wXO..|
[37ac 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[37ad 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[37ae 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37af 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37b0 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[37b1 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[37b3 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37b2 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37b4 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[37b5 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[37b6 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[37b7 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[37b8 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[37b9 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[37ba 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 22 69 2c 5f 42 8b 03 57 69 49 ad d9 a6 b1 0c |."i,_B..WiI.....|
00000010 95 e7 9c e2 29 3d b8 dc 72 2c 9e 6b d9 83 86 09 |....)=..r,.k....|
[37bb 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e 7c 06 75 84 f6 ac c0 60 8b fe 60 |0D. n|.u....`..`|
00000010 3b ba 79 44 28 a1 7b 78 65 91 3c 7c 36 f2 16 16 |;.yD(.{xe.<|6...|
00000020 b3 85 b7 af 02 20 01 9f a6 0d 8c 07 29 a3 c4 00 |..... ......)...|
00000030 81 78 62 a6 65 24 dd f7 68 20 c2 3a 33 7e de 3f |.xb.e$..h .:3~.?|
00000040 c0 ce 4a 29 7e 4f |..J)~O|
[37bd 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[37bc 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[37be 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008065db0 gate 1578074157328703800 evaluation starts
[37bf 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008065db0 signed by 0 principal evaluation starts (used [false])
[37c0 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008065db0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[37c1 01-03 17:55:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008065db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[37c2 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008065db0 principal evaluation fails
[37c3 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008065db0 gate 1578074157328703800 evaluation fails
[37c4 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[37c5 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[37c6 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[37c7 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 22 69 2c 5f 42 8b 03 57 69 49 ad d9 a6 b1 0c |."i,_B..WiI.....|
00000010 95 e7 9c e2 29 3d b8 dc 72 2c 9e 6b d9 83 86 09 |....)=..r,.k....|
[37c8 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e 7c 06 75 84 f6 ac c0 60 8b fe 60 |0D. n|.u....`..`|
00000010 3b ba 79 44 28 a1 7b 78 65 91 3c 7c 36 f2 16 16 |;.yD(.{xe.<|6...|
00000020 b3 85 b7 af 02 20 01 9f a6 0d 8c 07 29 a3 c4 00 |..... ......)...|
00000030 81 78 62 a6 65 24 dd f7 68 20 c2 3a 33 7e de 3f |.xb.e$..h .:3~.?|
00000040 c0 ce 4a 29 7e 4f |..J)~O|
[37c9 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[37ca 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00807a6b0 gate 1578074157334549900 evaluation starts
[37cb 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00807a6b0 signed by 0 principal evaluation starts (used [false])
[37cc 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00807a6b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[37cd 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00807a6b0 principal evaluation succeeds for identity 0
[37ce 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00807a6b0 gate 1578074157334549900 evaluation succeeds
[37cf 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[37d0 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[37d1 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[37d2 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[37d3 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[37d4 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37d5 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[37d6 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 58 0e ea 34 a0 0c 69 0c 99 7b d8 df fc bb 01 |.X..4..i..{.....|
00000010 69 0a e1 b3 9b e3 c2 3a ce 1e 01 eb 7f 14 29 e8 |i......:......).|
[37d7 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 41 9d 9a 16 e9 4b 0d ba 4a 79 |0E.!..A....K..Jy|
00000010 ab 84 90 a6 ab 11 0c 7d 2d 87 8c bb b2 70 75 13 |.......}-....pu.|
00000020 75 3e c6 ad 9e 02 20 66 c8 1c 67 34 c3 be 9b 4a |u>.... f..g4...J|
00000030 a1 52 8d 38 c0 c5 75 55 5e f8 cd ba ca ff e4 54 |.R.8..uU^......T|
00000040 0e 2e 77 58 4f e7 b1 |..wXO..|
[37d8 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[37d9 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[37da 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37db 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37dc 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37dd 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[37de 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[37df 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 58 0e ea 34 a0 0c 69 0c 99 7b d8 df fc bb 01 |.X..4..i..{.....|
00000010 69 0a e1 b3 9b e3 c2 3a ce 1e 01 eb 7f 14 29 e8 |i......:......).|
[37e0 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 41 9d 9a 16 e9 4b 0d ba 4a 79 |0E.!..A....K..Jy|
00000010 ab 84 90 a6 ab 11 0c 7d 2d 87 8c bb b2 70 75 13 |.......}-....pu.|
00000020 75 3e c6 ad 9e 02 20 66 c8 1c 67 34 c3 be 9b 4a |u>.... f..g4...J|
00000030 a1 52 8d 38 c0 c5 75 55 5e f8 cd ba ca ff e4 54 |.R.8..uU^......T|
00000040 0e 2e 77 58 4f e7 b1 |..wXO..|
[37e1 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[37e2 01-03 17:55:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 29 c6 2f 86 cf 88 0d aa ae 81 |0E.!..)./.......|
00000010 ec af a7 4a dd 8b 9e 14 02 8f 76 4f fd 01 aa 0d |...J......vO....|
00000020 8b dd 11 50 e5 02 20 29 de 00 a2 30 ad 64 1d 35 |...P.. )...0.d.5|
00000030 1d cb 7a eb 37 d3 6a 9f 46 22 57 12 34 d0 31 20 |..z.7.j.F"W.4.1 |
00000040 b9 46 e3 04 57 24 89 |.F..W$.|
[37e3 01-03 17:55:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[37e4 01-03 17:55:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[37e5 01-03 17:55:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37e6 01-03 17:55:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37e7 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37e8 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37e9 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[37ea 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[37eb 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37ec 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[37ed 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37ee 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[37ef 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37f0 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[37f1 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[37f2 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37f3 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37f4 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37f5 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[37f6 01-03 17:55:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[37f7 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[37f8 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[37f9 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[37fa 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[37fb 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[37fc 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[37fd 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[37fe 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080aa500 gate 1578074157452858100 evaluation starts
[37ff 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080aa500 signed by 0 principal evaluation starts (used [false])
[3800 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080aa500 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3801 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080aa500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3803 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080aa500 principal evaluation fails
[3802 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3804 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080aa500 gate 1578074157452858100 evaluation fails
[3805 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3806 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3807 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3808 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3809 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[380a 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[380b 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008045430 gate 1578074157458413500 evaluation starts
[380c 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008045430 signed by 0 principal evaluation starts (used [false])
[380d 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008045430 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[380e 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008045430 principal evaluation succeeds for identity 0
[380f 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008045430 gate 1578074157458413500 evaluation succeeds
[3810 01-03 17:55:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3811 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3812 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3813 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3814 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3815 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3816 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3817 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3818 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3819 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[381a 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[381b 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[381c 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[381d 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[381e 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[381f 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3820 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3821 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3822 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3823 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080c7bf0 gate 1578074157468326900 evaluation starts
[3824 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080c7bf0 signed by 0 principal evaluation starts (used [false])
[3825 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080c7bf0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3826 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080c7bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3827 01-03 17:55:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080c7bf0 principal evaluation fails
[3828 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080c7bf0 gate 1578074157468326900 evaluation fails
[3829 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[382a 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[382b 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[382c 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[382d 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[382e 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[382f 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080dc4f0 gate 1578074157471866700 evaluation starts
[3830 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080dc4f0 signed by 0 principal evaluation starts (used [false])
[3831 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080dc4f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3832 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080dc4f0 principal evaluation succeeds for identity 0
[3833 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080dc4f0 gate 1578074157471866700 evaluation succeeds
[3834 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3835 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3836 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3837 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3838 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3839 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[383a 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[383b 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[383c 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[383d 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[383e 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[383f 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3840 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3841 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3842 01-03 17:55:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3843 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3844 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3845 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3846 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3847 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3848 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3849 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f8e90 gate 1578074157481865100 evaluation starts
[384a 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f8e90 signed by 0 principal evaluation starts (used [false])
[384b 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f8e90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[384c 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f8e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[384d 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f8e90 principal evaluation fails
[384e 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f8e90 gate 1578074157481865100 evaluation fails
[384f 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3850 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3851 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3852 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3853 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3854 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3855 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f9790 gate 1578074157486903300 evaluation starts
[3856 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f9790 signed by 0 principal evaluation starts (used [false])
[3857 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f9790 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3858 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f9790 principal evaluation succeeds for identity 0
[3859 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0080f9790 gate 1578074157486903300 evaluation succeeds
[385a 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[385b 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[385c 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[385d 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[385e 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[385f 01-03 17:55:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3860 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3861 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3862 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3863 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3864 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3865 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3866 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3867 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3868 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3869 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810b1f0 gate 1578074157492367800 evaluation starts
[386a 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810b1f0 signed by 0 principal evaluation starts (used [false])
[386b 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810b1f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[386c 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810b1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[386d 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810b1f0 principal evaluation fails
[386e 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810b1f0 gate 1578074157492367800 evaluation fails
[386f 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3870 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3871 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3872 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3873 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3874 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3875 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810baf0 gate 1578074157495651100 evaluation starts
[3876 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810baf0 signed by 0 principal evaluation starts (used [false])
[3877 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810baf0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3878 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810baf0 principal evaluation succeeds for identity 0
[3879 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00810baf0 gate 1578074157495651100 evaluation succeeds
[387a 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[387b 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[387c 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[387d 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[387e 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[387f 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3880 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3881 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3882 01-03 17:55:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3883 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3884 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3885 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3886 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3887 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3888 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3889 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[388a 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[388b 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[388c 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008121800 gate 1578074157504853800 evaluation starts
[388d 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008121800 signed by 0 principal evaluation starts (used [false])
[388e 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008121800 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[388f 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008121800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3890 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008121800 principal evaluation fails
[3891 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008121800 gate 1578074157504853800 evaluation fails
[3892 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3893 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3894 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3895 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3896 01-03 17:55:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3897 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3898 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008138100 gate 1578074157510269600 evaluation starts
[3899 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008138100 signed by 0 principal evaluation starts (used [false])
[389a 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008138100 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[389b 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008138100 principal evaluation succeeds for identity 0
[389c 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008138100 gate 1578074157510269600 evaluation succeeds
[389d 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[389e 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[389f 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[38a0 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[38a1 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[38a2 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[38a3 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38a4 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38a5 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[38a6 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[38a7 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[38a8 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[38a9 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[38aa 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[38ab 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[38ac 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[38ad 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38ae 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152210 gate 1578074157519216800 evaluation starts
[38af 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152210 signed by 0 principal evaluation starts (used [false])
[38b0 01-03 17:55:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152210 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[38b1 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[38b2 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152210 principal evaluation fails
[38b3 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152210 gate 1578074157519216800 evaluation fails
[38b4 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[38b5 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[38b6 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[38b7 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[38b8 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[38b9 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38ba 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152b10 gate 1578074157523628100 evaluation starts
[38bb 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152b10 signed by 0 principal evaluation starts (used [false])
[38bc 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152b10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[38bd 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152b10 principal evaluation succeeds for identity 0
[38be 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008152b10 gate 1578074157523628100 evaluation succeeds
[38bf 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[38c0 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[38c1 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[38c2 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[38c3 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38c4 01-03 17:55:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38c5 01-03 17:55:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[38c6 01-03 17:55:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38c7 01-03 17:55:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38c8 01-03 17:55:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7876315653671919571 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[38c9 01-03 17:55:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7876315653671919571 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[38ca 01-03 17:55:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38cb 01-03 17:55:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[38cc 01-03 17:55:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[38cd 01-03 17:55:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38ce 01-03 17:55:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7876315653671919571 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[38cf 01-03 17:55:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7876315653671919571 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[38d0 01-03 17:55:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38d1 01-03 17:55:57.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[38d2 01-03 17:55:57.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38d3 01-03 17:55:57.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38d4 01-03 17:55:57.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38d5 01-03 17:55:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10399375291638774693 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[38d6 01-03 17:55:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10399375291638774693 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[38d7 01-03 17:55:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[38d8 01-03 17:55:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38d9 01-03 17:55:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[38da 01-03 17:55:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[38db 01-03 17:55:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38dc 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[38dd 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[38de 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38df 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[38e0 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[38e1 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[38e2 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[38e3 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[38e4 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[38e5 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 c0 f6 3f 8a 04 86 35 cc ba fe 47 19 cb 34 9f |...?...5...G..4.|
00000010 93 8b 15 3f 00 11 8f c2 1c 6b 11 e6 85 59 7a 2e |...?.....k...Yz.|
[38e6 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 0b 1e 42 0a c3 7b eb 11 13 4d a0 |0D. E..B..{...M.|
00000010 2e 02 31 56 9b c8 bc 6d 40 9d 52 87 cc 59 74 9b |..1V...m@.R..Yt.|
00000020 b1 c2 20 18 02 20 57 d6 4c 64 c1 a7 ff 80 52 50 |.. .. W.Ld....RP|
00000030 f3 74 84 39 d9 91 ed a7 aa b4 5d 04 7b f9 dc f2 |.t.9......].{...|
00000040 d0 17 24 52 2a 3e |..$R*>|
[38e7 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38e8 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00816dce0 gate 1578074157995562400 evaluation starts
[38e9 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00816dce0 signed by 0 principal evaluation starts (used [false])
[38ea 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00816dce0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[38eb 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00816dce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[38ec 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00816dce0 principal evaluation fails
[38ed 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00816dce0 gate 1578074157995562400 evaluation fails
[38ee 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[38ef 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[38f0 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[38f1 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 c0 f6 3f 8a 04 86 35 cc ba fe 47 19 cb 34 9f |...?...5...G..4.|
00000010 93 8b 15 3f 00 11 8f c2 1c 6b 11 e6 85 59 7a 2e |...?.....k...Yz.|
[38f2 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 0b 1e 42 0a c3 7b eb 11 13 4d a0 |0D. E..B..{...M.|
00000010 2e 02 31 56 9b c8 bc 6d 40 9d 52 87 cc 59 74 9b |..1V...m@.R..Yt.|
00000020 b1 c2 20 18 02 20 57 d6 4c 64 c1 a7 ff 80 52 50 |.. .. W.Ld....RP|
00000030 f3 74 84 39 d9 91 ed a7 aa b4 5d 04 7b f9 dc f2 |.t.9......].{...|
00000040 d0 17 24 52 2a 3e |..$R*>|
[38f3 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38f4 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081885e0 gate 1578074157997342500 evaluation starts
[38f5 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081885e0 signed by 0 principal evaluation starts (used [false])
[38f6 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081885e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[38f7 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081885e0 principal evaluation succeeds for identity 0
[38f8 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081885e0 gate 1578074157997342500 evaluation succeeds
[38f9 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[38fa 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[38fb 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[38fc 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[38fd 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[38fe 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}
[38ff 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49
[3900 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49
[3901 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3902 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3903 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3904 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3905 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3906 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3907 01-03 17:55:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3908 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3909 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[390a 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[390b 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[390c 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[390d 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[390e 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[390f 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3910 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3911 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3912 01-03 17:55:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3913 01-03 17:55:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3914 01-03 17:55:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3915 01-03 17:55:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3916 01-03 17:55:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3917 01-03 17:55:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3918 01-03 17:55:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3919 01-03 17:55:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[391a 01-03 17:55:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[391b 01-03 17:55:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[391c 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[391d 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[391e 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[391f 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3920 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3921 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3922 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3923 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3924 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3925 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3926 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3927 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3928 01-03 17:55:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 c4 9e b2 7f a2 b9 39 de 90 ba f0 0e a1 fd 1b |.......9........|
00000010 67 30 fb e8 6c 58 30 c5 dd cd cc 6e d8 75 ad fa |g0..lX0....n.u..|
[3929 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a e5 d9 ee b7 eb 38 5f 0c 71 4d 59 |0D. :.....8_.qMY|
00000010 b1 7c 87 de fc 49 e3 c4 d9 c4 12 e3 2d 87 ce a1 |.|...I......-...|
00000020 dc 84 25 98 02 20 6f 43 13 90 5c ef cd 6e b2 1a |..%.. oC..\..n..|
00000030 b8 f0 ce d7 5b b1 af 98 91 a8 50 c6 88 e4 54 d4 |....[.....P...T.|
00000040 fc 24 9a 94 4d 52 |.$..MR|
[392a 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[392b 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081a1e20 gate 1578074158091353200 evaluation starts
[392c 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081a1e20 signed by 0 principal evaluation starts (used [false])
[392d 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081a1e20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[392e 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081a1e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[392f 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081a1e20 principal evaluation fails
[3930 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081a1e20 gate 1578074158091353200 evaluation fails
[3931 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3932 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3933 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3934 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 c4 9e b2 7f a2 b9 39 de 90 ba f0 0e a1 fd 1b |.......9........|
00000010 67 30 fb e8 6c 58 30 c5 dd cd cc 6e d8 75 ad fa |g0..lX0....n.u..|
[3935 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a e5 d9 ee b7 eb 38 5f 0c 71 4d 59 |0D. :.....8_.qMY|
00000010 b1 7c 87 de fc 49 e3 c4 d9 c4 12 e3 2d 87 ce a1 |.|...I......-...|
00000020 dc 84 25 98 02 20 6f 43 13 90 5c ef cd 6e b2 1a |..%.. oC..\..n..|
00000030 b8 f0 ce d7 5b b1 af 98 91 a8 50 c6 88 e4 54 d4 |....[.....P...T.|
00000040 fc 24 9a 94 4d 52 |.$..MR|
[3936 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3937 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081b6720 gate 1578074158094910600 evaluation starts
[3938 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081b6720 signed by 0 principal evaluation starts (used [false])
[3939 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081b6720 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[393a 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081b6720 principal evaluation succeeds for identity 0
[393b 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0081b6720 gate 1578074158094910600 evaluation succeeds
[393c 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[393d 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[393e 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[393f 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3940 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3941 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}
[3942 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51
[3943 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51
[3944 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3945 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3946 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3947 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3948 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3949 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[394a 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[394b 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[394c 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[394d 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[394e 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[394f 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3950 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3951 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3952 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3953 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3954 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3955 01-03 17:55:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3956 01-03 17:55:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3957 01-03 17:55:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3958 01-03 17:55:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3959 01-03 17:55:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[395a 01-03 17:55:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[395b 01-03 17:55:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[395c 01-03 17:55:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[395d 01-03 17:55:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[395e 01-03 17:55:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[395f 01-03 17:55:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3960 01-03 17:55:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3961 01-03 17:55:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3962 01-03 17:55:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3963 01-03 17:55:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3964 01-03 17:55:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3965 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151030
[3966 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6337B5AFABE2DA8629CDC8C30E43B071D9AEF10EA745E085514684A4739C11CA
[3967 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3968 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3969 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[396a 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[396b 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[396c 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[396d 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[396e 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes to 1 peers
[396f 01-03 17:55:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3970 01-03 17:55:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3971 01-03 17:55:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3972 01-03 17:55:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3973 01-03 17:55:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3974 01-03 17:55:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3975 01-03 17:55:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes
[3976 01-03 17:55:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3977 01-03 17:55:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3978 01-03 17:55:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3979 01-03 17:55:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[397a 01-03 17:55:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[397b 01-03 17:55:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[397c 01-03 17:55:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[397d 01-03 17:55:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:1183067574953532334 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[397e 01-03 17:55:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1183067574953532334 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[397f 01-03 17:55:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3980 01-03 17:55:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3981 01-03 17:55:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[3982 01-03 17:55:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3983 01-03 17:55:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[3984 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3985 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 33 d5 26 66 92 d7 7f 31 26 4d f1 0f 5c cf 74 |.3.&f...1&M..\.t|
00000010 d7 d5 10 e0 9f 6b 90 1e 8f 0f fc 8e 18 75 64 d8 |.....k.......ud.|
[3986 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e e5 fb d9 e2 77 0b 75 42 30 0e b1 |0D. .....w.uB0..|
00000010 92 0e 3f 55 92 d1 ab 51 66 7e 61 a7 78 af 5e 95 |..?U...Qf~a.x.^.|
00000020 9b 4d 77 31 02 20 10 20 6b d6 43 74 7a 51 f5 3e |.Mw1. . k.CtzQ.>|
00000030 e8 aa 4a 95 c1 48 65 0a aa b8 03 77 97 d9 d1 90 |..J..He....w....|
00000040 ea 3f eb d7 70 43 |.?..pC|
[3987 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3988 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 85 0b dd 74 a0 32 6b ba 35 79 |0E.!.....t.2k.5y|
00000010 1d a3 d5 c7 d3 9d bf bc 2d 51 d5 3e b6 53 7a e1 |........-Q.>.Sz.|
00000020 8d 41 a5 7c c5 02 20 1b 11 f5 69 50 72 2c 1e f4 |.A.|.. ...iPr,..|
00000030 41 01 31 90 6b 21 90 ee f8 86 c9 76 8d 4a 56 b8 |A.1.k!.....v.JV.|
00000040 f1 db e8 53 da 74 52 |...S.tR|
[3989 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[398a 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[398b 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52
[398c 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52
[398d 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[398e 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[398f 01-03 17:55:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3990 01-03 17:55:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3991 01-03 17:55:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3992 01-03 17:55:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3993 01-03 17:55:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3994 01-03 17:55:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers
[3995 01-03 17:55:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[3996 01-03 17:55:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[3997 01-03 17:55:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3998 01-03 17:56:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:10652730637502904692 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3999 01-03 17:56:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:10652730637502904692 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[399a 01-03 17:56:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10652730637502904692 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[399b 01-03 17:56:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[399c 01-03 17:56:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[399d 01-03 17:56:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[399e 01-03 17:56:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[399f 01-03 17:56:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39a0 01-03 17:56:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39a1 01-03 17:56:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[39a2 01-03 17:56:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39a3 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6984024395640602612 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[39a4 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:6984024395640602612 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[39a5 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6984024395640602612 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[39a6 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39a7 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39a8 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39a9 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39aa 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39ab 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39ac 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[39ad 01-03 17:56:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39ae 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[39af 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[39b0 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39b1 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[39b2 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[39b3 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39b4 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[39b5 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[39b6 01-03 17:56:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[39b7 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[39b8 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[39b9 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[39ba 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 80 85 0d 78 ab d1 7a c0 fb b1 53 6e e5 96 d6 |q...x..z...Sn...|
00000010 9b 99 fd f4 13 15 8c c9 b6 8b 66 c8 58 82 ef 51 |..........f.X..Q|
[39bb 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 54 2c 0c f3 eb 2f 4b ee 5b 2d |0E.!..T,.../K.[-|
00000010 8d 7c 3c ea 77 32 83 b9 9b 66 7c fb 49 19 55 98 |.|<.w2...f|.I.U.|
00000020 96 58 c8 ea 18 02 20 28 bd ab d9 b0 0c 85 86 cf |.X.... (........|
00000030 e3 a3 99 f4 e3 c1 c5 84 c6 b0 21 ce 81 24 3a 12 |..........!..$:.|
00000040 27 58 a9 51 01 8f b3 |'X.Q...|
[39bc 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[39bd 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825c4e0 gate 1578074161124674900 evaluation starts
[39be 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825c4e0 signed by 0 principal evaluation starts (used [false])
[39bf 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825c4e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[39c0 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825c4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[39c1 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825c4e0 principal evaluation fails
[39c2 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825c4e0 gate 1578074161124674900 evaluation fails
[39c3 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[39c4 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[39c5 01-03 17:56:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[39c6 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 80 85 0d 78 ab d1 7a c0 fb b1 53 6e e5 96 d6 |q...x..z...Sn...|
00000010 9b 99 fd f4 13 15 8c c9 b6 8b 66 c8 58 82 ef 51 |..........f.X..Q|
[39c7 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 54 2c 0c f3 eb 2f 4b ee 5b 2d |0E.!..T,.../K.[-|
00000010 8d 7c 3c ea 77 32 83 b9 9b 66 7c fb 49 19 55 98 |.|<.w2...f|.I.U.|
00000020 96 58 c8 ea 18 02 20 28 bd ab d9 b0 0c 85 86 cf |.X.... (........|
00000030 e3 a3 99 f4 e3 c1 c5 84 c6 b0 21 ce 81 24 3a 12 |..........!..$:.|
00000040 27 58 a9 51 01 8f b3 |'X.Q...|
[39c8 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[39c9 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825cde0 gate 1578074161132740300 evaluation starts
[39ca 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825cde0 signed by 0 principal evaluation starts (used [false])
[39cb 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825cde0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[39cc 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825cde0 principal evaluation succeeds for identity 0
[39cd 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00825cde0 gate 1578074161132740300 evaluation succeeds
[39ce 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[39cf 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[39d0 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[39d1 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[39d2 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[39d3 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes]}
[39d4 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52
[39d5 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52
[39d6 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[39d7 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39d8 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39d9 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[39da 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39db 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39dc 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39dd 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[39de 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[39df 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[39e0 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39e1 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[39e2 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[39e3 01-03 17:56:01.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39e4 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39e5 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[39e6 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[39e7 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39e8 01-03 17:56:01.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[39e9 01-03 17:56:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[39ea 01-03 17:56:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[39eb 01-03 17:56:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[39ec 01-03 17:56:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[39ed 01-03 17:56:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[39ee 01-03 17:56:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 40 20 c9 25 23 13 8a a6 36 2e 88 2c a5 66 7e |8@ .%#...6..,.f~|
00000010 80 3e 3a 2b 5a 74 75 0b a1 59 39 5f 84 19 73 38 |.>:+Ztu..Y9_..s8|
[39ef 01-03 17:56:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 31 0f ea c2 8d 59 e5 26 de fa |0E.!..1....Y.&..|
00000010 dd 29 62 8a f6 6f e1 cc e8 39 1c 4b 25 25 f1 d2 |.)b..o...9.K%%..|
00000020 a0 27 34 b9 d1 02 20 51 d8 f7 99 5c 07 5c 4c f8 |.'4... Q...\.\L.|
00000030 7a 77 c7 f5 15 62 f3 49 f5 20 f7 21 a5 6e 33 ca |zw...b.I. .!.n3.|
00000040 8e 95 68 9e e4 18 c0 |..h....|
[39f0 01-03 17:56:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[39f1 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082771b0 gate 1578074161160249900 evaluation starts
[39f2 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082771b0 signed by 0 principal evaluation starts (used [false])
[39f3 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082771b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[39f4 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082771b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[39f5 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082771b0 principal evaluation fails
[39f6 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082771b0 gate 1578074161160249900 evaluation fails
[39f7 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[39f8 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[39f9 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[39fa 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 40 20 c9 25 23 13 8a a6 36 2e 88 2c a5 66 7e |8@ .%#...6..,.f~|
00000010 80 3e 3a 2b 5a 74 75 0b a1 59 39 5f 84 19 73 38 |.>:+Ztu..Y9_..s8|
[39fb 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 31 0f ea c2 8d 59 e5 26 de fa |0E.!..1....Y.&..|
00000010 dd 29 62 8a f6 6f e1 cc e8 39 1c 4b 25 25 f1 d2 |.)b..o...9.K%%..|
00000020 a0 27 34 b9 d1 02 20 51 d8 f7 99 5c 07 5c 4c f8 |.'4... Q...\.\L.|
00000030 7a 77 c7 f5 15 62 f3 49 f5 20 f7 21 a5 6e 33 ca |zw...b.I. .!.n3.|
00000040 8e 95 68 9e e4 18 c0 |..h....|
[39fc 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[39fd 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008277ab0 gate 1578074161166734600 evaluation starts
[39fe 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008277ab0 signed by 0 principal evaluation starts (used [false])
[39ff 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008277ab0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3a00 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008277ab0 principal evaluation succeeds for identity 0
[3a01 01-03 17:56:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008277ab0 gate 1578074161166734600 evaluation succeeds
[3a02 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3a03 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3a04 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3a05 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3a06 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes
[3a07 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes]}
[3a08 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50
[3a09 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50
[3a0a 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3a0b 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a0c 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a0d 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[3a0e 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a0f 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a10 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a11 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[3a12 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3a13 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3a14 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a15 01-03 17:56:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a16 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3a17 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14698102762992546711 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3a18 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[3a19 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12006244775042663394 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3a1a 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[3a1b 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10867372209033740048 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3a1c 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10867372209033740048 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a1d 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a1e 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14698102762992546711 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a1f 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a20 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12006244775042663394 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a21 01-03 17:56:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a22 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12006244775042663394 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3a23 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12006244775042663394 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3a24 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a25 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14698102762992546711 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[3a26 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14698102762992546711 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[3a27 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14698102762992546711 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[3a28 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a29 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10867372209033740048 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3a2a 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10867372209033740048 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3a2b 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10867372209033740048 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3a2c 01-03 17:56:01.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a2d 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151031
[3a2e 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0DE2992255E218306550F8C6172B695B243CA80F47349651512A761D356E3070
[3a2f 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3a30 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3a31 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a32 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[3a33 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a34 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[3a35 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[3a36 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[3a37 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a38 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3a39 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a3a 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3a3b 01-03 17:56:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a3c 01-03 17:56:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3a3d 01-03 17:56:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3a3e 01-03 17:56:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a3f 01-03 17:56:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3a40 01-03 17:56:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3a41 01-03 17:56:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 33 d5 26 66 92 d7 7f 31 26 4d f1 0f 5c cf 74 |.3.&f...1&M..\.t|
00000010 d7 d5 10 e0 9f 6b 90 1e 8f 0f fc 8e 18 75 64 d8 |.....k.......ud.|
[3a42 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e e5 fb d9 e2 77 0b 75 42 30 0e b1 |0D. .....w.uB0..|
00000010 92 0e 3f 55 92 d1 ab 51 66 7e 61 a7 78 af 5e 95 |..?U...Qf~a.x.^.|
00000020 9b 4d 77 31 02 20 10 20 6b d6 43 74 7a 51 f5 3e |.Mw1. . k.CtzQ.>|
00000030 e8 aa 4a 95 c1 48 65 0a aa b8 03 77 97 d9 d1 90 |..J..He....w....|
00000040 ea 3f eb d7 70 43 |.?..pC|
[3a43 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes
[3a44 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a45 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3a46 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d e2 99 22 55 e2 18 30 65 50 f8 c6 17 2b 69 5b |..."U..0eP...+i[|
00000010 24 3c a8 0f 47 34 96 51 51 2a 76 1d 35 6e 30 70 |$<..G4.QQ*v.5n0p|
[3a47 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef b9 74 a8 de 93 c4 70 0c 65 b0 |0E.!...t....p.e.|
00000010 fc 6b 7d c1 98 9b 21 04 cd 43 3f 92 29 08 9b 74 |.k}...!..C?.)..t|
00000020 ca 6c 36 2c 18 02 20 4e 8d 9f d5 c9 cf a4 05 bd |.l6,.. N........|
00000030 33 d8 38 e2 0f 91 11 3c 9f 3c 8d 6a e0 75 b6 2a |3.8....<.<.j.u.*|
00000040 3c bb a9 33 bd 21 86 |<..3.!.|
[3a48 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes
[3a49 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes
[3a4a 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a4b 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3a4c 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a4d 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3a4e 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3a4f 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3a50 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3a51 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3a52 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3a53 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 80 85 0d 78 ab d1 7a c0 fb b1 53 6e e5 96 d6 |q...x..z...Sn...|
00000010 9b 99 fd f4 13 15 8c c9 b6 8b 66 c8 58 82 ef 51 |..........f.X..Q|
[3a54 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 54 2c 0c f3 eb 2f 4b ee 5b 2d |0E.!..T,.../K.[-|
00000010 8d 7c 3c ea 77 32 83 b9 9b 66 7c fb 49 19 55 98 |.|<.w2...f|.I.U.|
00000020 96 58 c8 ea 18 02 20 28 bd ab d9 b0 0c 85 86 cf |.X.... (........|
00000030 e3 a3 99 f4 e3 c1 c5 84 c6 b0 21 ce 81 24 3a 12 |..........!..$:.|
00000040 27 58 a9 51 01 8f b3 |'X.Q...|
[3a55 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3a56 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cd430 gate 1578074161326435100 evaluation starts
[3a57 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cd430 signed by 0 principal evaluation starts (used [false])
[3a58 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cd430 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3a59 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cd430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3a5a 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cd430 principal evaluation fails
[3a5b 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cd430 gate 1578074161326435100 evaluation fails
[3a5c 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3a5d 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3a5e 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3a61 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 80 85 0d 78 ab d1 7a c0 fb b1 53 6e e5 96 d6 |q...x..z...Sn...|
00000010 9b 99 fd f4 13 15 8c c9 b6 8b 66 c8 58 82 ef 51 |..........f.X..Q|
[3a5f 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3a60 01-03 17:56:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3a62 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 54 2c 0c f3 eb 2f 4b ee 5b 2d |0E.!..T,.../K.[-|
00000010 8d 7c 3c ea 77 32 83 b9 9b 66 7c fb 49 19 55 98 |.|<.w2...f|.I.U.|
00000020 96 58 c8 ea 18 02 20 28 bd ab d9 b0 0c 85 86 cf |.X.... (........|
00000030 e3 a3 99 f4 e3 c1 c5 84 c6 b0 21 ce 81 24 3a 12 |..........!..$:.|
00000040 27 58 a9 51 01 8f b3 |'X.Q...|
[3a63 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3a64 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cdd30 gate 1578074161331339700 evaluation starts
[3a65 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cdd30 signed by 0 principal evaluation starts (used [false])
[3a66 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cdd30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3a67 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cdd30 principal evaluation succeeds for identity 0
[3a68 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082cdd30 gate 1578074161331339700 evaluation succeeds
[3a69 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3a6a 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3a6b 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3a6c 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3a6d 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3a6e 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a6f 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a70 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a71 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3a72 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3a73 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3a74 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d e2 99 22 55 e2 18 30 65 50 f8 c6 17 2b 69 5b |..."U..0eP...+i[|
00000010 24 3c a8 0f 47 34 96 51 51 2a 76 1d 35 6e 30 70 |$<..G4.QQ*v.5n0p|
[3a75 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef b9 74 a8 de 93 c4 70 0c 65 b0 |0E.!...t....p.e.|
00000010 fc 6b 7d c1 98 9b 21 04 cd 43 3f 92 29 08 9b 74 |.k}...!..C?.)..t|
00000020 ca 6c 36 2c 18 02 20 4e 8d 9f d5 c9 cf a4 05 bd |.l6,.. N........|
00000030 33 d8 38 e2 0f 91 11 3c 9f 3c 8d 6a e0 75 b6 2a |3.8....<.<.j.u.*|
00000040 3c bb a9 33 bd 21 86 |<..3.!.|
[3a76 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3a77 01-03 17:56:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 45 3e 8e 9f aa ed 36 a8 35 74 |0E.!..E>....6.5t|
00000010 58 44 3a 0e e8 57 30 c0 e0 53 28 13 d8 ed da ab |XD:..W0..S(.....|
00000020 10 98 c4 95 c1 02 20 2d f7 59 8b 95 eb 35 d9 93 |...... -.Y...5..|
00000030 a4 e7 95 53 8a 62 1d cd 79 2c 04 9d f9 a8 ef a9 |...S.b..y,......|
00000040 80 27 e1 d0 d6 de bc |.'.....|
[3a78 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3a79 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3a7a 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a7b 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a7c 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3a7e 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3a7d 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a7f 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a80 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3a81 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3a82 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3a83 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3a84 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3a85 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3a86 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 40 20 c9 25 23 13 8a a6 36 2e 88 2c a5 66 7e |8@ .%#...6..,.f~|
00000010 80 3e 3a 2b 5a 74 75 0b a1 59 39 5f 84 19 73 38 |.>:+Ztu..Y9_..s8|
[3a87 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 31 0f ea c2 8d 59 e5 26 de fa |0E.!..1....Y.&..|
00000010 dd 29 62 8a f6 6f e1 cc e8 39 1c 4b 25 25 f1 d2 |.)b..o...9.K%%..|
00000020 a0 27 34 b9 d1 02 20 51 d8 f7 99 5c 07 5c 4c f8 |.'4... Q...\.\L.|
00000030 7a 77 c7 f5 15 62 f3 49 f5 20 f7 21 a5 6e 33 ca |zw...b.I. .!.n3.|
00000040 8e 95 68 9e e4 18 c0 |..h....|
[3a88 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3a89 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082feeb0 gate 1578074161345279800 evaluation starts
[3a8a 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082feeb0 signed by 0 principal evaluation starts (used [false])
[3a8b 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082feeb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3a8c 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082feeb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3a8d 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082feeb0 principal evaluation fails
[3a8e 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082feeb0 gate 1578074161345279800 evaluation fails
[3a8f 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3a90 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3a91 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3a92 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 40 20 c9 25 23 13 8a a6 36 2e 88 2c a5 66 7e |8@ .%#...6..,.f~|
00000010 80 3e 3a 2b 5a 74 75 0b a1 59 39 5f 84 19 73 38 |.>:+Ztu..Y9_..s8|
[3a93 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 31 0f ea c2 8d 59 e5 26 de fa |0E.!..1....Y.&..|
00000010 dd 29 62 8a f6 6f e1 cc e8 39 1c 4b 25 25 f1 d2 |.)b..o...9.K%%..|
00000020 a0 27 34 b9 d1 02 20 51 d8 f7 99 5c 07 5c 4c f8 |.'4... Q...\.\L.|
00000030 7a 77 c7 f5 15 62 f3 49 f5 20 f7 21 a5 6e 33 ca |zw...b.I. .!.n3.|
00000040 8e 95 68 9e e4 18 c0 |..h....|
[3a94 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3a95 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082ff7b0 gate 1578074161349575200 evaluation starts
[3a96 01-03 17:56:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082ff7b0 signed by 0 principal evaluation starts (used [false])
[3a97 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082ff7b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3a98 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082ff7b0 principal evaluation succeeds for identity 0
[3a99 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0082ff7b0 gate 1578074161349575200 evaluation succeeds
[3a9a 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3a9b 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3a9c 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3a9d 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3a9e 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes
[3a9f 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3aa0 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3aa1 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d e2 99 22 55 e2 18 30 65 50 f8 c6 17 2b 69 5b |..."U..0eP...+i[|
00000010 24 3c a8 0f 47 34 96 51 51 2a 76 1d 35 6e 30 70 |$<..G4.QQ*v.5n0p|
[3aa2 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef b9 74 a8 de 93 c4 70 0c 65 b0 |0E.!...t....p.e.|
00000010 fc 6b 7d c1 98 9b 21 04 cd 43 3f 92 29 08 9b 74 |.k}...!..C?.)..t|
00000020 ca 6c 36 2c 18 02 20 4e 8d 9f d5 c9 cf a4 05 bd |.l6,.. N........|
00000030 33 d8 38 e2 0f 91 11 3c 9f 3c 8d 6a e0 75 b6 2a |3.8....<.<.j.u.*|
00000040 3c bb a9 33 bd 21 86 |<..3.!.|
[3aa3 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes
[3aa4 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes
[3aa5 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3aa6 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3aa7 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 33 d5 26 66 92 d7 7f 31 26 4d f1 0f 5c cf 74 |.3.&f...1&M..\.t|
00000010 d7 d5 10 e0 9f 6b 90 1e 8f 0f fc 8e 18 75 64 d8 |.....k.......ud.|
[3aa8 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e e5 fb d9 e2 77 0b 75 42 30 0e b1 |0D. .....w.uB0..|
00000010 92 0e 3f 55 92 d1 ab 51 66 7e 61 a7 78 af 5e 95 |..?U...Qf~a.x.^.|
00000020 9b 4d 77 31 02 20 10 20 6b d6 43 74 7a 51 f5 3e |.Mw1. . k.CtzQ.>|
00000030 e8 aa 4a 95 c1 48 65 0a aa b8 03 77 97 d9 d1 90 |..J..He....w....|
00000040 ea 3f eb d7 70 43 |.?..pC|
[3aa9 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes
[3aaa 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3aab 01-03 17:56:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3aac 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3aad 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3aae 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[3aaf 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3ab0 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ab1 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3ab2 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ab3 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3ab4 01-03 17:56:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ab5 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3ab6 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3ab7 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ab8 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ab9 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3aba 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3abb 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3abc 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3abd 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3abe 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3abf 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3ac0 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3ac1 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3ac2 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ac4 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008332df0 gate 1578074161456829900 evaluation starts
[3ac5 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008332df0 signed by 0 principal evaluation starts (used [false])
[3ac6 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008332df0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3ac7 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008332df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3ac8 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008332df0 principal evaluation fails
[3ac9 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008332df0 gate 1578074161456829900 evaluation fails
[3aca 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3ac3 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3acb 01-03 17:56:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3acc 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3acd 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3ace 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3acf 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ad0 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008333850 gate 1578074161461505000 evaluation starts
[3ad1 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008333850 signed by 0 principal evaluation starts (used [false])
[3ad2 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008333850 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3ad3 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008333850 principal evaluation succeeds for identity 0
[3ad4 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008333850 gate 1578074161461505000 evaluation succeeds
[3ad5 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3ad6 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3ad7 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3ad8 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3ad9 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3ada 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3adb 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3adc 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3add 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ade 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3adf 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3ae0 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3ae1 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3ae2 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ae3 01-03 17:56:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3ae4 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3ae5 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3ae6 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3ae7 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ae8 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e010 gate 1578074161471269700 evaluation starts
[3ae9 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e010 signed by 0 principal evaluation starts (used [false])
[3aea 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e010 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3aeb 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3aec 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e010 principal evaluation fails
[3aed 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e010 gate 1578074161471269700 evaluation fails
[3aee 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3aef 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3af0 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3af1 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3af2 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3af3 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3af4 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e910 gate 1578074161474565000 evaluation starts
[3af5 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e910 signed by 0 principal evaluation starts (used [false])
[3af6 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e910 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3af7 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e910 principal evaluation succeeds for identity 0
[3af8 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00835e910 gate 1578074161474565000 evaluation succeeds
[3af9 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3afa 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3afb 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3afc 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3afd 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3afe 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3aff 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3b00 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3b01 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3b02 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3b03 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b04 01-03 17:56:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b05 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3b06 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3b07 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3b08 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3b09 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3b0a 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3b0b 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3b0c 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3b0d 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b0e 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083772b0 gate 1578074161482463700 evaluation starts
[3b0f 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083772b0 signed by 0 principal evaluation starts (used [false])
[3b10 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083772b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3b11 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083772b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3b12 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083772b0 principal evaluation fails
[3b13 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083772b0 gate 1578074161482463700 evaluation fails
[3b14 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3b15 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3b16 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3b17 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3b18 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3b19 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b1a 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008377bb0 gate 1578074161484792500 evaluation starts
[3b1b 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008377bb0 signed by 0 principal evaluation starts (used [false])
[3b1c 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008377bb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3b1d 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008377bb0 principal evaluation succeeds for identity 0
[3b1e 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008377bb0 gate 1578074161484792500 evaluation succeeds
[3b1f 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3b20 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3b21 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3b22 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3b23 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b24 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[3b25 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[3b26 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510101801
[3b27 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 022DC1EE78669CE359C252F2DB0D5A26C8B2BD0BBBF13D1303832B134D2F65DA
[3b28 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[3b29 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b2a 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b2b 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b2c 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3b2e 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3b2d 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b30 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b2f 01-03 17:56:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3b31 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3b32 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3b33 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3b34 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3b35 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3b36 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:16 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[3b37 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b39 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b38 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b3a 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a40b0 gate 1578074161494369700 evaluation starts
[3b3b 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a40b0 signed by 0 principal evaluation starts (used [false])
[3b3d 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a40b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3b3e 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a40b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3b3f 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a40b0 principal evaluation fails
[3b40 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a40b0 gate 1578074161494369700 evaluation fails
[3b3c 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:16 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[3b41 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3b42 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3b43 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3b44 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3b45 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3b46 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b47 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a45d0 gate 1578074161497608600 evaluation starts
[3b48 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a45d0 signed by 0 principal evaluation starts (used [false])
[3b49 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a45d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3b4a 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a45d0 principal evaluation succeeds for identity 0
[3b4b 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083a45d0 gate 1578074161497608600 evaluation succeeds
[3b4c 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3b4d 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3b4e 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3b4f 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3b50 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b51 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3b52 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b53 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b54 01-03 17:56:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b55 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b56 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3b57 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3b58 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3b59 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3b5a 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3b5b 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3b5c 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3b5d 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3b5e 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b5f 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083ca2e0 gate 1578074161504611700 evaluation starts
[3b60 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083ca2e0 signed by 0 principal evaluation starts (used [false])
[3b61 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083ca2e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3b62 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083ca2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3b63 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083ca2e0 principal evaluation fails
[3b64 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083ca2e0 gate 1578074161504611700 evaluation fails
[3b65 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3b66 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3b67 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3b68 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3b69 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3b6a 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b6b 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083cabe0 gate 1578074161507378000 evaluation starts
[3b6c 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083cabe0 signed by 0 principal evaluation starts (used [false])
[3b6d 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083cabe0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3b6e 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083cabe0 principal evaluation succeeds for identity 0
[3b6f 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083cabe0 gate 1578074161507378000 evaluation succeeds
[3b70 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3b71 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3b72 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3b73 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3b74 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3b75 01-03 17:56:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3b76 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b77 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b78 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3b79 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3b7a 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3b7b 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3b7c 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3b7d 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3b7e 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3b7f 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3b80 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b81 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dccf0 gate 1578074161514367400 evaluation starts
[3b82 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dccf0 signed by 0 principal evaluation starts (used [false])
[3b83 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dccf0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3b84 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dccf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3b85 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dccf0 principal evaluation fails
[3b86 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dccf0 gate 1578074161514367400 evaluation fails
[3b87 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3b88 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3b89 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3b8a 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3b8b 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3b8c 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b8d 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dd5f0 gate 1578074161516944300 evaluation starts
[3b8e 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dd5f0 signed by 0 principal evaluation starts (used [false])
[3b8f 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dd5f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3b90 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dd5f0 principal evaluation succeeds for identity 0
[3b91 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0083dd5f0 gate 1578074161516944300 evaluation succeeds
[3b92 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3b93 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3b94 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3b95 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3b96 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3b97 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3b98 01-03 17:56:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b99 01-03 17:56:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b9a 01-03 17:56:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b9b 01-03 17:56:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[3b9c 01-03 17:56:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b9d 01-03 17:56:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b9e 01-03 17:56:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9875842892901866520 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[3b9f 01-03 17:56:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9875842892901866520 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3ba0 01-03 17:56:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ba1 01-03 17:56:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9875842892901866520 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[3ba2 01-03 17:56:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9875842892901866520 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[3ba3 01-03 17:56:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ba4 01-03 17:56:01.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[3ba5 01-03 17:56:01.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ba6 01-03 17:56:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ba7 01-03 17:56:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ba8 01-03 17:56:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11385495986635537856 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3ba9 01-03 17:56:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11385495986635537856 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3baa 01-03 17:56:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3bab 01-03 17:56:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bac 01-03 17:56:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3bad 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bae 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3baf 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3bb0 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 cb c2 e9 35 6e f7 fd 51 29 37 f4 df 43 92 c7 |"...5n..Q)7..C..|
00000010 11 20 14 fb b3 8c a6 90 a0 b3 9a 82 f3 4d eb 46 |. ...........M.F|
[3bb1 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 44 8b 6d ed 31 6d 0a 1b 78 c3 |0E.!..D.m.1m..x.|
00000010 c3 3d a2 41 95 ea 21 0e 31 6d 9e f1 c7 e1 68 f8 |.=.A..!.1m....h.|
00000020 b3 dc 61 31 55 02 20 3c 69 6a 0f 14 dc e4 0f 3a |..a1U. <ij.....:|
00000030 fb bf 66 2e c9 28 bb 2c ca 42 28 65 53 b7 7c 53 |..f..(.,.B(eS.|S|
00000040 8b d9 7a ac c5 c1 a3 |..z....|
[3bb2 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3bb3 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 30 95 97 fa f5 c7 c3 45 77 ae 10 |0D. ^0......Ew..|
00000010 c9 6f d0 14 03 ba a5 df cc 7a eb dc 81 59 fa 1c |.o.......z...Y..|
00000020 9d 49 e1 e6 02 20 49 4a 85 b5 25 97 c4 66 3a 0d |.I... IJ..%..f:.|
00000030 52 cf 99 41 5b 35 57 d1 a7 08 e5 25 d6 19 c1 c2 |R..A[5W....%....|
00000040 55 84 20 5e c6 94 |U. ^..|
[3bb4 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3bb5 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[3bb6 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53
[3bb7 01-03 17:56:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53
[3bb8 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[3bb9 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bba 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bbb 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bbc 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bbd 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bbe 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3bbf 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bc0 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3bc1 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3bc2 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bc3 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bc4 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3bc5 01-03 17:56:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bc6 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3bc7 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3bc8 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bc9 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3bca 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bcb 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3bcc 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3bcd 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bce 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3bcf 01-03 17:56:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bd0 01-03 17:56:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3bd1 01-03 17:56:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3bd2 01-03 17:56:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bd3 01-03 17:56:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bd4 01-03 17:56:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bd5 01-03 17:56:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bd6 01-03 17:56:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3bd7 01-03 17:56:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3bd8 01-03 17:56:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bd9 01-03 17:56:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bda 01-03 17:56:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bdb 01-03 17:56:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bdc 01-03 17:56:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3bdd 01-03 17:56:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3bde 01-03 17:56:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bdf 01-03 17:56:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3be0 01-03 17:56:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3be1 01-03 17:56:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3be2 01-03 17:56:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3be3 01-03 17:56:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3be4 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3be5 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3be6 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3be7 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3be8 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 c9 41 9d 45 37 06 26 6d 19 27 15 84 e5 31 c2 |$.A.E7.&m.'...1.|
00000010 3f a9 9c 11 64 5f 75 44 50 04 60 f1 56 5b a5 04 |?...d_uDP.`.V[..|
[3be9 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 8e 7c 36 ac ce 24 07 94 70 26 5b |0D. ..|6..$..p&[|
00000010 f2 4d 39 ee 06 91 92 d9 67 33 3b 45 3a a1 26 8b |.M9.....g3;E:.&.|
00000020 b9 31 21 11 02 20 5a 8b 56 cd 84 4a a2 d0 7b 83 |.1!.. Z.V..J..{.|
00000030 57 cf dd 28 d7 7d a7 c4 c5 0d b3 14 e0 f2 18 3c |W..(.}.........<|
00000040 95 4f f9 e6 6b 21 |.O..k!|
[3bea 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3beb 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084540d0 gate 1578074162994928800 evaluation starts
[3bec 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084540d0 signed by 0 principal evaluation starts (used [false])
[3bed 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084540d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3bee 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084540d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3bef 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084540d0 principal evaluation fails
[3bf0 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084540d0 gate 1578074162994928800 evaluation fails
[3bf1 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3bf2 01-03 17:56:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3bf3 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3bf4 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 c9 41 9d 45 37 06 26 6d 19 27 15 84 e5 31 c2 |$.A.E7.&m.'...1.|
00000010 3f a9 9c 11 64 5f 75 44 50 04 60 f1 56 5b a5 04 |?...d_uDP.`.V[..|
[3bf5 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 8e 7c 36 ac ce 24 07 94 70 26 5b |0D. ..|6..$..p&[|
00000010 f2 4d 39 ee 06 91 92 d9 67 33 3b 45 3a a1 26 8b |.M9.....g3;E:.&.|
00000020 b9 31 21 11 02 20 5a 8b 56 cd 84 4a a2 d0 7b 83 |.1!.. Z.V..J..{.|
00000030 57 cf dd 28 d7 7d a7 c4 c5 0d b3 14 e0 f2 18 3c |W..(.}.........<|
00000040 95 4f f9 e6 6b 21 |.O..k!|
[3bf6 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3bf7 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3bf8 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3bf9 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084549d0 gate 1578074163005333100 evaluation starts
[3bfa 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084549d0 signed by 0 principal evaluation starts (used [false])
[3bfb 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084549d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3bfc 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084549d0 principal evaluation succeeds for identity 0
[3bfd 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0084549d0 gate 1578074163005333100 evaluation succeeds
[3bfe 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3bff 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3c00 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3c01 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3c02 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3c03 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}
[3c04 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51
[3c05 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51
[3c06 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3c07 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c08 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c09 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c0a 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c0b 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3c0c 01-03 17:56:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c0d 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c0e 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c0f 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c10 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c11 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c12 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c13 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c14 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3c15 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c16 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3c17 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3c18 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c19 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3c1a 01-03 17:56:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c1b 01-03 17:56:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3c1c 01-03 17:56:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c1d 01-03 17:56:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3c1e 01-03 17:56:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c1f 01-03 17:56:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c20 01-03 17:56:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c21 01-03 17:56:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c22 01-03 17:56:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c23 01-03 17:56:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3c24 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c25 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3c26 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3c27 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3c28 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3c29 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3c2a 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3c2b 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 be bf 19 67 1d ea 33 69 76 2f b8 41 02 5a 1d |....g..3iv/.A.Z.|
00000010 03 ac 01 30 54 bf 52 e2 52 be a8 3d 7e ab 52 4a |...0T.R.R..=~.RJ|
[3c2c 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 0a 12 4c 77 08 5e 14 06 51 eb |0E.!....Lw.^..Q.|
00000010 a2 0f 3b 3c ab cf 74 67 f0 f9 b9 33 e5 b5 a3 2a |..;<..tg...3...*|
00000020 b7 a2 43 9c 5d 02 20 79 de 8f a7 a5 72 b6 15 df |..C.]. y....r...|
00000030 d2 b3 2c c5 b0 1b 02 e2 64 a9 31 b5 35 46 59 ea |..,.....d.1.5FY.|
00000040 32 13 c3 d7 b5 00 57 |2.....W|
[3c2d 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3c2e 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c2f 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c30 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00846bcb0 gate 1578074163097827700 evaluation starts
[3c31 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00846bcb0 signed by 0 principal evaluation starts (used [false])
[3c32 01-03 17:56:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00846bcb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3c33 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00846bcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3c34 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00846bcb0 principal evaluation fails
[3c35 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00846bcb0 gate 1578074163097827700 evaluation fails
[3c36 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3c37 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3c38 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3c39 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 be bf 19 67 1d ea 33 69 76 2f b8 41 02 5a 1d |....g..3iv/.A.Z.|
00000010 03 ac 01 30 54 bf 52 e2 52 be a8 3d 7e ab 52 4a |...0T.R.R..=~.RJ|
[3c3a 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 0a 12 4c 77 08 5e 14 06 51 eb |0E.!....Lw.^..Q.|
00000010 a2 0f 3b 3c ab cf 74 67 f0 f9 b9 33 e5 b5 a3 2a |..;<..tg...3...*|
00000020 b7 a2 43 9c 5d 02 20 79 de 8f a7 a5 72 b6 15 df |..C.]. y....r...|
00000030 d2 b3 2c c5 b0 1b 02 e2 64 a9 31 b5 35 46 59 ea |..,.....d.1.5FY.|
00000040 32 13 c3 d7 b5 00 57 |2.....W|
[3c3b 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3c3c 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00848c5b0 gate 1578074163104405400 evaluation starts
[3c3d 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00848c5b0 signed by 0 principal evaluation starts (used [false])
[3c3e 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00848c5b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3c3f 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00848c5b0 principal evaluation succeeds for identity 0
[3c40 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00848c5b0 gate 1578074163104405400 evaluation succeeds
[3c41 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3c42 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3c43 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3c44 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3c45 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c46 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes]}
[3c47 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53
[3c48 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53
[3c49 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3c4a 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c4b 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c4c 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c4d 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c4e 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c4f 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c50 01-03 17:56:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c51 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c53 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c52 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c54 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c55 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c56 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c57 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c58 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c59 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c5a 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3c5b 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c5c 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c5d 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3c5e 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c5f 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c60 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3c61 01-03 17:56:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c62 01-03 17:56:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151032
[3c63 01-03 17:56:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BD4C3EABAA96EDCE1FF4F64DC015DDDF144E376A238EA7C87C05AA2A93BED39F
[3c64 01-03 17:56:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3c65 01-03 17:56:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3c66 01-03 17:56:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[3c67 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c68 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c69 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c6a 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3c6b 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[3c6c 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c6d 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3c6e 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[3c6f 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c70 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[3c71 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c72 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3c73 01-03 17:56:03.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c74 01-03 17:56:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:16810892943519294655 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3c75 01-03 17:56:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16810892943519294655 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3c76 01-03 17:56:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3c77 01-03 17:56:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c78 01-03 17:56:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[3c79 01-03 17:56:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c7a 01-03 17:56:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[3c7b 01-03 17:56:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3c7c 01-03 17:56:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 da 12 bd ad e5 4f 00 fb 75 59 29 a2 24 f9 2a e1 |.....O..uY).$.*.|
00000010 cc 2a 86 1a 26 33 3e 06 dd 19 66 0b 3e 21 7a e1 |.*..&3>...f.>!z.|
[3c7d 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 73 49 34 52 a1 d6 a9 35 9c 15 09 |0D. .sI4R...5...|
00000010 8f ec 25 78 71 e9 c2 44 1a 09 7a 55 ee 17 82 87 |..%xq..D..zU....|
00000020 4b 61 41 8d 02 20 0d 65 f7 d6 fa 8a a0 f7 46 1a |KaA.. .e......F.|
00000030 d9 34 72 67 56 d2 80 b6 3d 21 22 2e 49 ad 4b 13 |.4rgV...=!".I.K.|
00000040 b6 40 a5 20 0b 82 |.@. ..|
[3c7e 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3c7f 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 82 11 33 7f 74 04 2f 17 53 77 75 |0D. 6..3.t./.Swu|
00000010 9a cb 90 d1 94 64 63 32 cc 78 6f e8 c5 e3 19 cb |.....dc2.xo.....|
00000020 a9 b6 af 0e 02 20 43 a0 7e 5d f1 60 f4 58 02 66 |..... C.~].`.X.f|
00000030 7f fe d3 da ec 17 dc 3e 18 80 fb 3e fa 2d ee 3f |.......>...>.-.?|
00000040 3d 3a 68 f5 e3 d3 |=:h...|
[3c80 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3c81 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[3c82 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54
[3c83 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54
[3c84 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[3c85 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c86 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c87 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c88 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3c89 01-03 17:56:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c8a 01-03 17:56:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c8b 01-03 17:56:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers
[3c8c 01-03 17:56:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[3c8d 01-03 17:56:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[3c8e 01-03 17:56:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c8f 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:15718542471185707307 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3c90 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:15718542471185707307 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3c91 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15718542471185707307 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3c92 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c93 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c94 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c95 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c96 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c97 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c98 01-03 17:56:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[3c99 01-03 17:56:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c9a 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:15518049059625970219 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3c9b 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:15518049059625970219 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3c9c 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15518049059625970219 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3c9d 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c9e 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c9f 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ca0 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ca1 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ca2 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ca3 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[3ca4 01-03 17:56:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ca5 01-03 17:56:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3ca6 01-03 17:56:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3ca7 01-03 17:56:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ca8 01-03 17:56:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3ca9 01-03 17:56:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3caa 01-03 17:56:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cab 01-03 17:56:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3cac 01-03 17:56:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3cad 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3cae 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3caf 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3cb0 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3cb1 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d d8 9f 54 fb 1e a4 4f f6 6b 6a 43 18 5b a7 33 |M..T...O.kjC.[.3|
00000010 3f 8a 6b 28 a6 92 2e 0b bc f2 1a 6c 1a c9 ca 56 |?.k(.......l...V|
[3cb2 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 6a 20 23 89 45 14 59 fc dc 5e |0E.!..j #.E.Y..^|
00000010 a4 00 07 8a 72 cb fd 28 32 3b eb a0 2c 3a 7f 35 |....r..(2;..,:.5|
00000020 7f 7b c5 25 61 02 20 67 40 70 00 d7 71 5e 6c 26 |.{.%a. g@p..q^l&|
00000030 af 92 42 03 e9 26 81 7d 72 44 95 9a 0e bc 9f 33 |..B..&.}rD.....3|
00000040 12 28 b2 5d da f4 44 |.(.]..D|
[3cb3 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3cb4 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085087a0 gate 1578074165123282400 evaluation starts
[3cb5 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085087a0 signed by 0 principal evaluation starts (used [false])
[3cb6 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085087a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3cb7 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085087a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3cb8 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085087a0 principal evaluation fails
[3cb9 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085087a0 gate 1578074165123282400 evaluation fails
[3cba 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3cbb 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3cbc 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3cbd 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d d8 9f 54 fb 1e a4 4f f6 6b 6a 43 18 5b a7 33 |M..T...O.kjC.[.3|
00000010 3f 8a 6b 28 a6 92 2e 0b bc f2 1a 6c 1a c9 ca 56 |?.k(.......l...V|
[3cbe 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 6a 20 23 89 45 14 59 fc dc 5e |0E.!..j #.E.Y..^|
00000010 a4 00 07 8a 72 cb fd 28 32 3b eb a0 2c 3a 7f 35 |....r..(2;..,:.5|
00000020 7f 7b c5 25 61 02 20 67 40 70 00 d7 71 5e 6c 26 |.{.%a. g@p..q^l&|
00000030 af 92 42 03 e9 26 81 7d 72 44 95 9a 0e bc 9f 33 |..B..&.}rD.....3|
00000040 12 28 b2 5d da f4 44 |.(.]..D|
[3cbf 01-03 17:56:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3cc0 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085090a0 gate 1578074165131341000 evaluation starts
[3cc1 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085090a0 signed by 0 principal evaluation starts (used [false])
[3cc2 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085090a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3cc3 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085090a0 principal evaluation succeeds for identity 0
[3cc4 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085090a0 gate 1578074165131341000 evaluation succeeds
[3cc5 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3cc6 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3cc7 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3cc8 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3cc9 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3cca 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes]}
[3ccb 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54
[3ccc 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54
[3ccd 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3cce 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ccf 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cd0 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[3cd1 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd2 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd3 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd4 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[3cd5 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3cd6 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3cd7 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cd8 01-03 17:56:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cd9 01-03 17:56:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3cda 01-03 17:56:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3cdb 01-03 17:56:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cdc 01-03 17:56:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3cdd 01-03 17:56:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3cde 01-03 17:56:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cdf 01-03 17:56:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3ce0 01-03 17:56:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3ce1 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3ce2 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ce3 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3ce4 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3ce5 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 ac d6 8e 47 18 fe 67 37 12 e2 6a 36 a0 51 cb |7...G..g7..j6.Q.|
00000010 7e 3a 12 47 34 7e a3 a0 5e 1b ca 7a 7f 0e 4c e7 |~:.G4~..^..z..L.|
[3ce6 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 44 a6 19 ce f5 da 47 54 b2 96 |0E.!..D.....GT..|
00000010 47 4c f2 03 73 80 2d 6c 9b 66 84 8f bd e5 89 b6 |GL..s.-l.f......|
00000020 d0 15 f3 24 d9 02 20 71 cc c5 3d 9e 9c d4 85 01 |...$.. q..=.....|
00000030 b5 f4 dd 78 7c 5e a0 c1 31 b3 d3 81 68 7b b7 59 |...x|^..1...h{.Y|
00000040 15 e1 03 9a 2e bf 95 |.......|
[3ce7 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ce8 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525400 gate 1578074165157920400 evaluation starts
[3ce9 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525400 signed by 0 principal evaluation starts (used [false])
[3cea 01-03 17:56:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525400 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3ceb 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3cec 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525400 principal evaluation fails
[3ced 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525400 gate 1578074165157920400 evaluation fails
[3cee 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3cef 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3cf0 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3cf1 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 ac d6 8e 47 18 fe 67 37 12 e2 6a 36 a0 51 cb |7...G..g7..j6.Q.|
00000010 7e 3a 12 47 34 7e a3 a0 5e 1b ca 7a 7f 0e 4c e7 |~:.G4~..^..z..L.|
[3cf2 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 44 a6 19 ce f5 da 47 54 b2 96 |0E.!..D.....GT..|
00000010 47 4c f2 03 73 80 2d 6c 9b 66 84 8f bd e5 89 b6 |GL..s.-l.f......|
00000020 d0 15 f3 24 d9 02 20 71 cc c5 3d 9e 9c d4 85 01 |...$.. q..=.....|
00000030 b5 f4 dd 78 7c 5e a0 c1 31 b3 d3 81 68 7b b7 59 |...x|^..1...h{.Y|
00000040 15 e1 03 9a 2e bf 95 |.......|
[3cf3 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3cf4 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525d00 gate 1578074165164856800 evaluation starts
[3cf5 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525d00 signed by 0 principal evaluation starts (used [false])
[3cf6 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525d00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3cf7 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525d00 principal evaluation succeeds for identity 0
[3cf8 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008525d00 gate 1578074165164856800 evaluation succeeds
[3cf9 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3cfa 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3cfb 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3cfc 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3cfd 01-03 17:56:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3cfe 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes]}
[3cff 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52
[3d00 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52
[3d01 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3d02 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d03 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d04 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d05 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[3d06 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d07 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d08 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d09 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[3d0a 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3d0b 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d0c 01-03 17:56:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3d0d 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[3d0e 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1057413527047074345 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3d0f 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[3d10 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11040339963390781257 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3d11 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3d12 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1367506700252734259 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3d13 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1367506700252734259 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d14 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d15 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1057413527047074345 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d16 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d17 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11040339963390781257 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3d18 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d19 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1367506700252734259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[3d1a 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1367506700252734259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[3d1b 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1367506700252734259 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[3d1c 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d1d 01-03 17:56:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1057413527047074345 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[3d1e 01-03 17:56:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1057413527047074345 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[3d1f 01-03 17:56:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1057413527047074345 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[3d20 01-03 17:56:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d21 01-03 17:56:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11040339963390781257 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3d22 01-03 17:56:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11040339963390781257 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3d23 01-03 17:56:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d24 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151033
[3d25 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 75E1555F88E6A2E37923163016EC0D33F2AB19015C39011FB93193B47FC1C68F
[3d26 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3d27 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3d28 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d29 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[3d2a 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d2b 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[3d2c 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[3d2d 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[3d2f 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d30 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3d31 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d2e 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3d32 01-03 17:56:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d33 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3d34 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3d35 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d36 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3d37 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3d38 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 e1 55 5f 88 e6 a2 e3 79 23 16 30 16 ec 0d 33 |u.U_....y#.0...3|
00000010 f2 ab 19 01 5c 39 01 1f b9 31 93 b4 7f c1 c6 8f |....\9...1......|
[3d39 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 fa 02 98 0f 7e 6c 58 3a 3e ef 18 |0D. I....~lX:>..|
00000010 a5 ce 9f df dd c6 e4 34 a7 19 8c 87 1b f3 b5 15 |.......4........|
00000020 c3 3b 88 a5 02 20 67 f0 fa 70 92 69 6b ce fe 65 |.;... g..p.ik..e|
00000030 4d f3 ad 34 57 04 c4 45 eb c1 14 92 a8 c2 94 93 |M..4W..E........|
00000040 77 d7 f7 8d 68 12 |w...h.|
[3d3a 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3d3b 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3d3c 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d3d 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3d3e 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d3f 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3d40 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3d41 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3d42 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3d43 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3d44 01-03 17:56:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3d45 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3d46 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d d8 9f 54 fb 1e a4 4f f6 6b 6a 43 18 5b a7 33 |M..T...O.kjC.[.3|
00000010 3f 8a 6b 28 a6 92 2e 0b bc f2 1a 6c 1a c9 ca 56 |?.k(.......l...V|
[3d47 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 6a 20 23 89 45 14 59 fc dc 5e |0E.!..j #.E.Y..^|
00000010 a4 00 07 8a 72 cb fd 28 32 3b eb a0 2c 3a 7f 35 |....r..(2;..,:.5|
00000020 7f 7b c5 25 61 02 20 67 40 70 00 d7 71 5e 6c 26 |.{.%a. g@p..q^l&|
00000030 af 92 42 03 e9 26 81 7d 72 44 95 9a 0e bc 9f 33 |..B..&.}rD.....3|
00000040 12 28 b2 5d da f4 44 |.(.]..D|
[3d48 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3d49 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008577f20 gate 1578074165346943600 evaluation starts
[3d4a 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008577f20 signed by 0 principal evaluation starts (used [false])
[3d4b 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008577f20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3d4c 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008577f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3d4d 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008577f20 principal evaluation fails
[3d4e 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008577f20 gate 1578074165346943600 evaluation fails
[3d4f 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3d51 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3d52 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3d50 01-03 17:56:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3d53 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d d8 9f 54 fb 1e a4 4f f6 6b 6a 43 18 5b a7 33 |M..T...O.kjC.[.3|
00000010 3f 8a 6b 28 a6 92 2e 0b bc f2 1a 6c 1a c9 ca 56 |?.k(.......l...V|
[3d54 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 6a 20 23 89 45 14 59 fc dc 5e |0E.!..j #.E.Y..^|
00000010 a4 00 07 8a 72 cb fd 28 32 3b eb a0 2c 3a 7f 35 |....r..(2;..,:.5|
00000020 7f 7b c5 25 61 02 20 67 40 70 00 d7 71 5e 6c 26 |.{.%a. g@p..q^l&|
00000030 af 92 42 03 e9 26 81 7d 72 44 95 9a 0e bc 9f 33 |..B..&.}rD.....3|
00000040 12 28 b2 5d da f4 44 |.(.]..D|
[3d55 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3d56 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008572c20 gate 1578074165351518300 evaluation starts
[3d57 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008572c20 signed by 0 principal evaluation starts (used [false])
[3d58 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008572c20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3d59 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008572c20 principal evaluation succeeds for identity 0
[3d5a 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008572c20 gate 1578074165351518300 evaluation succeeds
[3d5b 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3d5c 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3d5d 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3d5e 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3d5f 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3d60 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d61 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3d62 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 da 12 bd ad e5 4f 00 fb 75 59 29 a2 24 f9 2a e1 |.....O..uY).$.*.|
00000010 cc 2a 86 1a 26 33 3e 06 dd 19 66 0b 3e 21 7a e1 |.*..&3>...f.>!z.|
[3d63 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 73 49 34 52 a1 d6 a9 35 9c 15 09 |0D. .sI4R...5...|
00000010 8f ec 25 78 71 e9 c2 44 1a 09 7a 55 ee 17 82 87 |..%xq..D..zU....|
00000020 4b 61 41 8d 02 20 0d 65 f7 d6 fa 8a a0 f7 46 1a |KaA.. .e......F.|
00000030 d9 34 72 67 56 d2 80 b6 3d 21 22 2e 49 ad 4b 13 |.4rgV...=!".I.K.|
00000040 b6 40 a5 20 0b 82 |.@. ..|
[3d64 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[3d65 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d66 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d67 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d68 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3d69 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3d6a 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3d6b 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 e1 55 5f 88 e6 a2 e3 79 23 16 30 16 ec 0d 33 |u.U_....y#.0...3|
00000010 f2 ab 19 01 5c 39 01 1f b9 31 93 b4 7f c1 c6 8f |....\9...1......|
[3d6c 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 fa 02 98 0f 7e 6c 58 3a 3e ef 18 |0D. I....~lX:>..|
00000010 a5 ce 9f df dd c6 e4 34 a7 19 8c 87 1b f3 b5 15 |.......4........|
00000020 c3 3b 88 a5 02 20 67 f0 fa 70 92 69 6b ce fe 65 |.;... g..p.ik..e|
00000030 4d f3 ad 34 57 04 c4 45 eb c1 14 92 a8 c2 94 93 |M..4W..E........|
00000040 77 d7 f7 8d 68 12 |w...h.|
[3d6d 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3d6e 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 5d e8 24 18 05 0c 64 80 4d 55 |0E.!..].$...d.MU|
00000010 97 1c 99 44 70 72 46 01 94 1a d9 4b 89 e9 23 76 |...DprF....K..#v|
00000020 7c a8 8b 9b 8e 02 20 1c 98 46 90 d9 b7 03 84 92 ||..... ..F......|
00000030 75 05 a7 25 5d cd 55 46 3f d7 f9 d0 e1 bb 1a 7c |u..%].UF?......||
00000040 f9 67 b9 fd c8 7d fd |.g...}.|
[3d6f 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3d70 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3d71 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d72 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d73 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d74 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3d75 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3d76 01-03 17:56:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 da 12 bd ad e5 4f 00 fb 75 59 29 a2 24 f9 2a e1 |.....O..uY).$.*.|
00000010 cc 2a 86 1a 26 33 3e 06 dd 19 66 0b 3e 21 7a e1 |.*..&3>...f.>!z.|
[3d77 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 73 49 34 52 a1 d6 a9 35 9c 15 09 |0D. .sI4R...5...|
00000010 8f ec 25 78 71 e9 c2 44 1a 09 7a 55 ee 17 82 87 |..%xq..D..zU....|
00000020 4b 61 41 8d 02 20 0d 65 f7 d6 fa 8a a0 f7 46 1a |KaA.. .e......F.|
00000030 d9 34 72 67 56 d2 80 b6 3d 21 22 2e 49 ad 4b 13 |.4rgV...=!".I.K.|
00000040 b6 40 a5 20 0b 82 |.@. ..|
[3d78 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[3d79 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d7a 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3d7b 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d7c 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3d7d 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3d7e 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3d7f 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3d80 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3d81 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3d82 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 ac d6 8e 47 18 fe 67 37 12 e2 6a 36 a0 51 cb |7...G..g7..j6.Q.|
00000010 7e 3a 12 47 34 7e a3 a0 5e 1b ca 7a 7f 0e 4c e7 |~:.G4~..^..z..L.|
[3d83 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 44 a6 19 ce f5 da 47 54 b2 96 |0E.!..D.....GT..|
00000010 47 4c f2 03 73 80 2d 6c 9b 66 84 8f bd e5 89 b6 |GL..s.-l.f......|
00000020 d0 15 f3 24 d9 02 20 71 cc c5 3d 9e 9c d4 85 01 |...$.. q..=.....|
00000030 b5 f4 dd 78 7c 5e a0 c1 31 b3 d3 81 68 7b b7 59 |...x|^..1...h{.Y|
00000040 15 e1 03 9a 2e bf 95 |.......|
[3d84 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3d85 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b50a0 gate 1578074165363761600 evaluation starts
[3d86 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b50a0 signed by 0 principal evaluation starts (used [false])
[3d87 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b50a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3d88 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b50a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3d89 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b50a0 principal evaluation fails
[3d8a 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b50a0 gate 1578074165363761600 evaluation fails
[3d8b 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3d8c 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3d8d 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3d8e 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 ac d6 8e 47 18 fe 67 37 12 e2 6a 36 a0 51 cb |7...G..g7..j6.Q.|
00000010 7e 3a 12 47 34 7e a3 a0 5e 1b ca 7a 7f 0e 4c e7 |~:.G4~..^..z..L.|
[3d8f 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 44 a6 19 ce f5 da 47 54 b2 96 |0E.!..D.....GT..|
00000010 47 4c f2 03 73 80 2d 6c 9b 66 84 8f bd e5 89 b6 |GL..s.-l.f......|
00000020 d0 15 f3 24 d9 02 20 71 cc c5 3d 9e 9c d4 85 01 |...$.. q..=.....|
00000030 b5 f4 dd 78 7c 5e a0 c1 31 b3 d3 81 68 7b b7 59 |...x|^..1...h{.Y|
00000040 15 e1 03 9a 2e bf 95 |.......|
[3d90 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3d91 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b59a0 gate 1578074165366922700 evaluation starts
[3d92 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b59a0 signed by 0 principal evaluation starts (used [false])
[3d93 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b59a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3d94 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b59a0 principal evaluation succeeds for identity 0
[3d95 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085b59a0 gate 1578074165366922700 evaluation succeeds
[3d96 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3d97 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3d98 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3d99 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3d9a 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3d9b 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d9c 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[3d9d 01-03 17:56:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 e1 55 5f 88 e6 a2 e3 79 23 16 30 16 ec 0d 33 |u.U_....y#.0...3|
00000010 f2 ab 19 01 5c 39 01 1f b9 31 93 b4 7f c1 c6 8f |....\9...1......|
[3d9e 01-03 17:56:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 fa 02 98 0f 7e 6c 58 3a 3e ef 18 |0D. I....~lX:>..|
00000010 a5 ce 9f df dd c6 e4 34 a7 19 8c 87 1b f3 b5 15 |.......4........|
00000020 c3 3b 88 a5 02 20 67 f0 fa 70 92 69 6b ce fe 65 |.;... g..p.ik..e|
00000030 4d f3 ad 34 57 04 c4 45 eb c1 14 92 a8 c2 94 93 |M..4W..E........|
00000040 77 d7 f7 8d 68 12 |w...h.|
[3d9f 01-03 17:56:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3da0 01-03 17:56:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3da1 01-03 17:56:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3da2 01-03 17:56:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3da3 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3da4 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3da5 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[3da6 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3da7 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3da8 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3da9 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3daa 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[3dab 01-03 17:56:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3dac 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3dad 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3dae 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3daf 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3db0 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3db1 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3db2 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3db3 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3db4 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3db5 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3db6 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3db7 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3db8 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3db9 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3dba 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3dbb 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3dbc 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3dbd 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3dbe 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085e5910 gate 1578074165457239900 evaluation starts
[3dbf 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085e5910 signed by 0 principal evaluation starts (used [false])
[3dc0 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085e5910 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3dc1 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085e5910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3dc2 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085e5910 principal evaluation fails
[3dc3 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085e5910 gate 1578074165457239900 evaluation fails
[3dc4 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3dc5 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3dc6 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3dc7 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3dc8 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3dc9 01-03 17:56:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3dca 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fc210 gate 1578074165461010300 evaluation starts
[3dcb 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fc210 signed by 0 principal evaluation starts (used [false])
[3dcc 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fc210 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3dcd 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fc210 principal evaluation succeeds for identity 0
[3dce 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fc210 gate 1578074165461010300 evaluation succeeds
[3dcf 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3dd0 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3dd1 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3dd2 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3dd3 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3dd4 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3dd5 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3dd6 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3dd7 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3dd8 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3dd9 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3dda 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3ddb 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3ddc 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3ddd 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3dde 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fdc70 gate 1578074165468785500 evaluation starts
[3ddf 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fdc70 signed by 0 principal evaluation starts (used [false])
[3de0 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fdc70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3de1 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fdc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3de2 01-03 17:56:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fdc70 principal evaluation fails
[3de3 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0085fdc70 gate 1578074165468785500 evaluation fails
[3de4 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3de5 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3de6 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3de7 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3de8 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3de9 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3dea 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008614570 gate 1578074165471758600 evaluation starts
[3deb 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008614570 signed by 0 principal evaluation starts (used [false])
[3dec 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008614570 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3ded 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008614570 principal evaluation succeeds for identity 0
[3dee 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008614570 gate 1578074165471758600 evaluation succeeds
[3def 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3df0 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3df1 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3df2 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3df3 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3df4 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3df5 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3df6 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3df7 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3df8 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3df9 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3dfa 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3dfb 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3dfc 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3dfd 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3dfe 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3dff 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3e00 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e01 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628280 gate 1578074165479368700 evaluation starts
[3e02 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628280 signed by 0 principal evaluation starts (used [false])
[3e03 01-03 17:56:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628280 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3e04 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3e05 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628280 principal evaluation fails
[3e06 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628280 gate 1578074165479368700 evaluation fails
[3e07 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3e08 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3e09 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3e0a 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3e0b 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3e0c 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e0d 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628b80 gate 1578074165482909400 evaluation starts
[3e0e 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628b80 signed by 0 principal evaluation starts (used [false])
[3e0f 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628b80 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3e10 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628b80 principal evaluation succeeds for identity 0
[3e11 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008628b80 gate 1578074165482909400 evaluation succeeds
[3e12 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3e13 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3e14 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3e15 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3e16 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3e17 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3e18 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e19 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e1a 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3e1b 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3e1c 01-03 17:56:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3e1d 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3e1e 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3e1f 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3e20 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3e21 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3e22 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e23 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863cc90 gate 1578074165491455800 evaluation starts
[3e24 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863cc90 signed by 0 principal evaluation starts (used [false])
[3e25 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863cc90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3e26 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863cc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3e27 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863cc90 principal evaluation fails
[3e28 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863cc90 gate 1578074165491455800 evaluation fails
[3e29 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3e2a 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3e2b 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3e2c 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3e2d 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3e2e 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e2f 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863d590 gate 1578074165494414500 evaluation starts
[3e30 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863d590 signed by 0 principal evaluation starts (used [false])
[3e31 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863d590 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3e32 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863d590 principal evaluation succeeds for identity 0
[3e33 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00863d590 gate 1578074165494414500 evaluation succeeds
[3e34 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3e35 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3e36 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3e37 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3e38 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3e39 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3e3a 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e3b 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[3e3c 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e3d 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e3e 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e3f 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3e40 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3e41 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3e42 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3e43 01-03 17:56:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3e44 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3e45 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3e46 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3e47 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e48 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008659950 gate 1578074165503149000 evaluation starts
[3e49 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008659950 signed by 0 principal evaluation starts (used [false])
[3e4a 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008659950 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3e4b 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008659950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3e4c 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008659950 principal evaluation fails
[3e4d 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008659950 gate 1578074165503149000 evaluation fails
[3e4e 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3e4f 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3e50 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3e51 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[3e52 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[3e53 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e54 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008676250 gate 1578074165505823500 evaluation starts
[3e55 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008676250 signed by 0 principal evaluation starts (used [false])
[3e56 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008676250 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3e57 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008676250 principal evaluation succeeds for identity 0
[3e58 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008676250 gate 1578074165505823500 evaluation succeeds
[3e59 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3e5a 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3e5b 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3e5c 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3e5d 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[3e5e 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[3e5f 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[3e60 01-03 17:56:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[3e61 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e62 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e63 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3e64 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3e65 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3e66 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3e67 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3e68 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3e69 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3e6a 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3e6b 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e6c 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868ea10 gate 1578074165515174600 evaluation starts
[3e6d 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868ea10 signed by 0 principal evaluation starts (used [false])
[3e6e 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868ea10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3e6f 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868ea10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3e70 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868ea10 principal evaluation fails
[3e71 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868ea10 gate 1578074165515174600 evaluation fails
[3e72 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3e73 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3e74 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3e75 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[3e76 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[3e77 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e78 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868f310 gate 1578074165518758100 evaluation starts
[3e79 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868f310 signed by 0 principal evaluation starts (used [false])
[3e7a 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868f310 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3e7b 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868f310 principal evaluation succeeds for identity 0
[3e7c 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00868f310 gate 1578074165518758100 evaluation succeeds
[3e7d 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3e7e 01-03 17:56:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3e7f 01-03 17:56:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3e80 01-03 17:56:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3e81 01-03 17:56:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e82 01-03 17:56:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e83 01-03 17:56:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e84 01-03 17:56:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[3e85 01-03 17:56:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e86 01-03 17:56:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e87 01-03 17:56:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14923760556367599356 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[3e88 01-03 17:56:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14923760556367599356 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3e89 01-03 17:56:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e8a 01-03 17:56:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14923760556367599356 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[3e8b 01-03 17:56:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14923760556367599356 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[3e8c 01-03 17:56:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e8d 01-03 17:56:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[3e8e 01-03 17:56:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e8f 01-03 17:56:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e90 01-03 17:56:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e91 01-03 17:56:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4822440549035093341 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3e92 01-03 17:56:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4822440549035093341 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3e93 01-03 17:56:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3e94 01-03 17:56:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e95 01-03 17:56:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3e96 01-03 17:56:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[3e97 01-03 17:56:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e98 01-03 17:56:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e99 01-03 17:56:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e9a 01-03 17:56:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e9b 01-03 17:56:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3e9c 01-03 17:56:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[3e9d 01-03 17:56:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e9e 01-03 17:56:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e9f 01-03 17:56:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ea0 01-03 17:56:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ea1 01-03 17:56:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[3ea2 01-03 17:56:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[3ea3 01-03 17:56:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510111801
[3ea4 01-03 17:56:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0A03DE7EC4FAE582A3B139A3B9F119B4D0B90C96B8015F10967B49549011AE9C
[3ea5 01-03 17:56:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[3ea6 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ea7 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ea8 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ea9 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3eaa 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:17 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[3eab 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3eac 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:17 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[3ead 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3eae 01-03 17:56:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3eaf 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3eb0 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3eb1 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3eb2 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3eb3 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 ee b9 b4 e4 4b ba 99 bd e2 9b ef d0 73 cb b7 |s....K.......s..|
00000010 ab 45 3f a5 8b 31 0a 99 67 a3 30 5f 23 4d 1a 58 |.E?..1..g.0_#M.X|
[3eb4 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f0 a9 6d cd 62 64 27 13 12 6b 48 |0D. c..m.bd'..kH|
00000010 30 33 67 89 5e 35 71 d1 87 6f f5 0e ae e8 34 64 |03g.^5q..o....4d|
00000020 0a dd c2 f6 02 20 6f 49 e0 4e 71 92 ee 66 72 ee |..... oI.Nq..fr.|
00000030 14 2c 58 96 04 c0 0f 34 d9 9f 1a da aa 82 32 99 |.,X....4......2.|
00000040 c5 14 d1 32 6b ec |...2k.|
[3eb5 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3eb6 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 9c 7e de b1 ed ec 7d 22 22 6d ae |0D. d.~....}""m.|
00000010 a8 83 ac 03 60 eb 64 66 f7 98 e2 68 0a b6 aa cb |....`.df...h....|
00000020 12 59 54 1d 02 20 14 2c b5 7a 25 61 92 af b7 25 |.YT.. .,.z%a...%|
00000030 dc cb ad 71 3b 76 6b 3e 8c bd d2 3f ab 9f ca 61 |...q;vk>...?...a|
00000040 01 43 a6 07 4b b7 |.C..K.|
[3eb7 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3eb8 01-03 17:56:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[3eb9 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55
[3eba 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55
[3ebb 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[3ebc 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ebd 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ebe 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ebf 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ec0 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ec1 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ec2 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3ec3 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ec4 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3ec5 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3ec6 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ec7 01-03 17:56:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3ec8 01-03 17:56:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ec9 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3eca 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3ecb 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ecc 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3ecd 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ece 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3ecf 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3ed0 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ed1 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3ed2 01-03 17:56:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ed3 01-03 17:56:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:3799678532714523003 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3ed4 01-03 17:56:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3799678532714523003 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3ed5 01-03 17:56:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3ed6 01-03 17:56:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ed7 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[3ed8 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ed9 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[3eda 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[3edb 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 51 75 ed 0a 3b 81 ee 1a e2 17 7d d5 18 42 04 |.Qu..;.....}..B.|
00000010 96 2c d5 1a 1e 1e a7 66 e3 14 58 e8 5e d1 1f 06 |.,.....f..X.^...|
[3edc 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ae 8b 8a 57 94 b0 0e f4 89 f2 |0E.!.....W......|
00000010 f5 46 00 34 77 15 36 85 33 ea 78 a0 86 12 0c c0 |.F.4w.6.3.x.....|
00000020 37 ed fb 9e 58 02 20 13 49 b6 13 09 7a 9d 2a b7 |7...X. .I...z.*.|
00000030 5c 9e 5e 6d 55 77 f8 7e 0a 84 e2 5d a2 52 fb f2 |\.^mUw.~...].R..|
00000040 5d 47 63 52 07 f3 9f |]GcR...|
[3edd 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3ede 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 55 21 c4 e1 de 63 4d 8a 03 3f |0E.!..U!...cM..?|
00000010 7a 50 2b 47 9c 63 bd d8 8a 0f e6 24 62 99 f4 54 |zP+G.c.....$b..T|
00000020 8d 64 57 68 0e 02 20 0a 40 d5 2f 21 9e b3 5b cd |.dWh.. .@./!..[.|
00000030 72 2e b5 62 d6 44 31 42 eb 81 d8 db e9 50 c0 0c |r..b.D1B.....P..|
00000040 18 93 00 5e 42 08 2b |...^B.+|
[3edf 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3ee0 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[3ee1 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56
[3ee2 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56
[3ee3 01-03 17:56:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[3ee4 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ee5 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ee6 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[3ee7 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ee8 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ee9 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[3eea 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3eec 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3eed 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3eeb 01-03 17:56:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[3eee 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3eef 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3ef0 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ef1 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3ef2 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3ef3 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ef4 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3ef5 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3ef6 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3ef7 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ef8 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3ef9 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3efa 01-03 17:56:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 29 1c bb c1 f8 70 46 7b 1c de 52 3e 92 ae d4 |.)....pF{..R>...|
00000010 a6 47 2f d7 76 41 c1 dd 5c 5d 9f 2c 1e b9 48 6a |.G/.vA..\].,..Hj|
[3efb 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce c2 70 d4 6e 9c 2c 73 d1 ae 16 |0E.!...p.n.,s...|
00000010 ab e4 2d e3 30 40 cd de 3b aa 2a ac 7e fd 39 b8 |..-.0@..;.*.~.9.|
00000020 11 40 23 cf 4f 02 20 69 b8 6c 81 3f 3b 16 70 c7 |.@#.O. i.l.?;.p.|
00000030 8a 6a ba af b8 98 4d 6b ec fe fb 0b 91 39 09 78 |.j....Mk.....9.x|
00000040 7b 9d 00 7f b4 4f 55 |{....OU|
[3efc 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3efd 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724540 gate 1578074168012112600 evaluation starts
[3efe 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724540 signed by 0 principal evaluation starts (used [false])
[3eff 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724540 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3f00 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3f01 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724540 principal evaluation fails
[3f02 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724540 gate 1578074168012112600 evaluation fails
[3f03 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3f04 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3f05 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3f06 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 29 1c bb c1 f8 70 46 7b 1c de 52 3e 92 ae d4 |.)....pF{..R>...|
00000010 a6 47 2f d7 76 41 c1 dd 5c 5d 9f 2c 1e b9 48 6a |.G/.vA..\].,..Hj|
[3f07 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce c2 70 d4 6e 9c 2c 73 d1 ae 16 |0E.!...p.n.,s...|
00000010 ab e4 2d e3 30 40 cd de 3b aa 2a ac 7e fd 39 b8 |..-.0@..;.*.~.9.|
00000020 11 40 23 cf 4f 02 20 69 b8 6c 81 3f 3b 16 70 c7 |.@#.O. i.l.?;.p.|
00000030 8a 6a ba af b8 98 4d 6b ec fe fb 0b 91 39 09 78 |.j....Mk.....9.x|
00000040 7b 9d 00 7f b4 4f 55 |{....OU|
[3f08 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f09 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724e40 gate 1578074168013333300 evaluation starts
[3f0a 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724e40 signed by 0 principal evaluation starts (used [false])
[3f0c 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3f0d 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3f0b 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724e40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3f0e 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724e40 principal evaluation succeeds for identity 0
[3f0f 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008724e40 gate 1578074168013333300 evaluation succeeds
[3f10 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3f11 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3f12 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3f13 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3f14 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3f15 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes]}
[3f16 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53
[3f17 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53
[3f18 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3f19 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f1a 01-03 17:56:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f1b 01-03 17:56:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f1c 01-03 17:56:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3f1e 01-03 17:56:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f1d 01-03 17:56:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f1f 01-03 17:56:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3f20 01-03 17:56:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f21 01-03 17:56:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3f22 01-03 17:56:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f23 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f24 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f25 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f26 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f27 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f28 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f29 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3f2a 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f2b 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f2c 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3f2d 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3f2e 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f2f 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3f30 01-03 17:56:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f31 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f32 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f33 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f34 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f35 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3f36 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f37 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3f38 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3f39 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3f3a 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3f3b 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3f3c 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3f3d 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 9f 02 8c 36 aa 3a 38 f6 27 7a 0a 3b d5 c0 6e |....6.:8.'z.;..n|
00000010 94 a6 09 95 35 8e 11 89 4a 40 7d a2 92 b9 3f 50 |....5...J@}...?P|
[3f3e 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 f6 51 f8 e4 6b 72 2e 1c 3e ed 90 |0D. C.Q..kr..>..|
00000010 42 28 57 33 8b 89 c4 13 29 5f 5a 33 44 25 f9 dd |B(W3....)_Z3D%..|
00000020 d1 c3 0d 3e 02 20 2f 5e 60 94 a2 67 24 88 57 7a |...>. /^`..g$.Wz|
00000030 aa 80 49 f8 a4 7a 93 b8 aa aa 36 b7 f1 ee 0c 3c |..I..z....6....<|
00000040 37 46 f2 ff 2a 18 |7F..*.|
[3f3f 01-03 17:56:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f40 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087356e0 gate 1578074168090425600 evaluation starts
[3f41 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087356e0 signed by 0 principal evaluation starts (used [false])
[3f42 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087356e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3f43 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087356e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3f44 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087356e0 principal evaluation fails
[3f45 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087356e0 gate 1578074168090425600 evaluation fails
[3f46 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3f47 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3f48 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3f49 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 9f 02 8c 36 aa 3a 38 f6 27 7a 0a 3b d5 c0 6e |....6.:8.'z.;..n|
00000010 94 a6 09 95 35 8e 11 89 4a 40 7d a2 92 b9 3f 50 |....5...J@}...?P|
[3f4a 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 f6 51 f8 e4 6b 72 2e 1c 3e ed 90 |0D. C.Q..kr..>..|
00000010 42 28 57 33 8b 89 c4 13 29 5f 5a 33 44 25 f9 dd |B(W3....)_Z3D%..|
00000020 d1 c3 0d 3e 02 20 2f 5e 60 94 a2 67 24 88 57 7a |...>. /^`..g$.Wz|
00000030 aa 80 49 f8 a4 7a 93 b8 aa aa 36 b7 f1 ee 0c 3c |..I..z....6....<|
00000040 37 46 f2 ff 2a 18 |7F..*.|
[3f4b 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f4c 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008735fe0 gate 1578074168093871700 evaluation starts
[3f4d 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008735fe0 signed by 0 principal evaluation starts (used [false])
[3f4e 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008735fe0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3f4f 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008735fe0 principal evaluation succeeds for identity 0
[3f50 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008735fe0 gate 1578074168093871700 evaluation succeeds
[3f51 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3f52 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3f53 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3f54 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3f55 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f56 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes]}
[3f57 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55
[3f58 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55
[3f59 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3f5a 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f5b 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f5c 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f5d 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f5e 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f5f 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f60 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f62 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f63 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f64 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f61 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f65 01-03 17:56:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f66 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3f67 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f68 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3f69 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f6a 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f6b 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f6c 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f6d 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f6e 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f6f 01-03 17:56:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f70 01-03 17:56:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f71 01-03 17:56:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f72 01-03 17:56:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3f73 01-03 17:56:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f74 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151034
[3f75 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D6E17605F0D5EC8E176E3CADEF19D99117C39D063A51E965C1508D3C2D648390
[3f76 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3f77 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3f78 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[3f79 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f7a 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f7b 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f7c 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3f7d 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f7e 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3f7f 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[3f80 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3f81 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f82 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3f83 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f84 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3f85 01-03 17:56:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f86 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6940430498155875178 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3f87 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:6940430498155875178 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3f88 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6940430498155875178 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3f89 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f8a 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f8b 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f8c 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f8d 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f8e 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f8f 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[3f90 01-03 17:56:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f91 01-03 17:56:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:8016714588160939701 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3f92 01-03 17:56:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:8016714588160939701 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3f93 01-03 17:56:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8016714588160939701 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3f94 01-03 17:56:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f95 01-03 17:56:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f96 01-03 17:56:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f97 01-03 17:56:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f98 01-03 17:56:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f99 01-03 17:56:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f9a 01-03 17:56:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[3f9b 01-03 17:56:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f9c 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3f9d 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3f9e 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f9f 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3fa0 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[3fa1 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fa2 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3fa3 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3fa4 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3fa5 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3fa6 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3fa7 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3fa8 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f b2 da 35 c2 93 a9 31 38 89 c6 6d 1b 32 2c f3 |...5...18..m.2,.|
00000010 0a 0d f6 ab d2 36 1f 98 de 47 b1 10 ea 76 37 a7 |.....6...G...v7.|
[3fa9 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 8a d7 4a 27 27 16 03 6f e7 32 |0E.!....J''..o.2|
00000010 f5 47 b6 c6 e0 10 da c2 8d 15 0d 5e 8b 79 51 75 |.G.........^.yQu|
00000020 09 ad 0a d5 24 02 20 73 68 38 74 29 cf 89 07 88 |....$. sh8t)....|
00000030 e8 39 5c 49 65 26 6f 70 5d f0 a7 be 1e d3 49 b7 |.9\Ie&op].....I.|
00000040 86 e0 6c f8 f5 66 5d |..l..f]|
[3faa 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3fab 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bca70 gate 1578074169139581100 evaluation starts
[3fac 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bca70 signed by 0 principal evaluation starts (used [false])
[3fad 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bca70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3fae 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bca70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3faf 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bca70 principal evaluation fails
[3fb0 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bca70 gate 1578074169139581100 evaluation fails
[3fb1 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3fb2 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3fb3 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3fb4 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f b2 da 35 c2 93 a9 31 38 89 c6 6d 1b 32 2c f3 |...5...18..m.2,.|
00000010 0a 0d f6 ab d2 36 1f 98 de 47 b1 10 ea 76 37 a7 |.....6...G...v7.|
[3fb5 01-03 17:56:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 8a d7 4a 27 27 16 03 6f e7 32 |0E.!....J''..o.2|
00000010 f5 47 b6 c6 e0 10 da c2 8d 15 0d 5e 8b 79 51 75 |.G.........^.yQu|
00000020 09 ad 0a d5 24 02 20 73 68 38 74 29 cf 89 07 88 |....$. sh8t)....|
00000030 e8 39 5c 49 65 26 6f 70 5d f0 a7 be 1e d3 49 b7 |.9\Ie&op].....I.|
00000040 86 e0 6c f8 f5 66 5d |..l..f]|
[3fb6 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3fb7 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bd370 gate 1578074169140157800 evaluation starts
[3fb8 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bd370 signed by 0 principal evaluation starts (used [false])
[3fb9 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bd370 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[3fba 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bd370 principal evaluation succeeds for identity 0
[3fbb 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087bd370 gate 1578074169140157800 evaluation succeeds
[3fbc 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3fbd 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3fbe 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3fbf 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3fc0 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[3fc1 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes]}
[3fc2 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56
[3fc3 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56
[3fc4 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3fc5 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fc6 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fc7 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fc8 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[3fc9 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fca 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fcb 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fcc 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers
[3fcd 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3fce 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[3fcf 01-03 17:56:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fd0 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3fd1 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3fd2 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fd3 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3fd4 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[3fd5 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fd6 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3fd7 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3fd8 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3fd9 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3fda 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3fdb 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3fdc 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 a1 24 2e a6 10 f2 ca 0c cf ca de e2 06 88 28 |..$............(|
00000010 a2 cf 64 ee ea df 90 af 2f c7 d7 af 77 00 3c b6 |..d...../...w.<.|
[3fdd 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc f0 b2 c4 e5 88 8a 5e 51 fd e5 |0E.!........^Q..|
00000010 04 21 cd 49 3f 36 e6 5c a3 66 7a 98 44 e7 84 ef |.!.I?6.\.fz.D...|
00000020 69 b6 0d b3 55 02 20 1d 5e 47 34 ca e9 da ca 45 |i...U. .^G4....E|
00000030 0a 7f cb 5a 69 ea 3d ef d8 83 ba dc e1 7b a1 f7 |...Zi.=......{..|
00000040 b2 09 73 4a 4a 54 9c |..sJJT.|
[3fde 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3fdf 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087ee290 gate 1578074169209579200 evaluation starts
[3fe0 01-03 17:56:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087ee290 signed by 0 principal evaluation starts (used [false])
[3fe1 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087ee290 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3fe2 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087ee290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3fe3 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087ee290 principal evaluation fails
[3fe4 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087ee290 gate 1578074169209579200 evaluation fails
[3fe5 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3fe6 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3fe7 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3fe8 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 a1 24 2e a6 10 f2 ca 0c cf ca de e2 06 88 28 |..$............(|
00000010 a2 cf 64 ee ea df 90 af 2f c7 d7 af 77 00 3c b6 |..d...../...w.<.|
[3fe9 01-03 17:56:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc f0 b2 c4 e5 88 8a 5e 51 fd e5 |0E.!........^Q..|
00000010 04 21 cd 49 3f 36 e6 5c a3 66 7a 98 44 e7 84 ef |.!.I?6.\.fz.D...|
00000020 69 b6 0d b3 55 02 20 1d 5e 47 34 ca e9 da ca 45 |i...U. .^G4....E|
00000030 0a 7f cb 5a 69 ea 3d ef d8 83 ba dc e1 7b a1 f7 |...Zi.=......{..|
00000040 b2 09 73 4a 4a 54 9c |..sJJT.|
[3fea 01-03 17:56:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3feb 01-03 17:56:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087eeb90 gate 1578074169235215500 evaluation starts
[3fec 01-03 17:56:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087eeb90 signed by 0 principal evaluation starts (used [false])
[3fed 01-03 17:56:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087eeb90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[3fee 01-03 17:56:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087eeb90 principal evaluation succeeds for identity 0
[3fef 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3ff0 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2070179934420829206 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3ff1 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[3ff2 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10215093284408420503 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3ff3 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[3ff4 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17285570929739444942 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3ff5 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17285570929739444942 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3ff6 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ff7 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2070179934420829206 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3ff8 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ff9 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10215093284408420503 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3ffa 01-03 17:56:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ffb 01-03 17:56:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10215093284408420503 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3ffc 01-03 17:56:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10215093284408420503 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[3ffd 01-03 17:56:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ffe 01-03 17:56:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17285570929739444942 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[3fff 01-03 17:56:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17285570929739444942 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[4000 01-03 17:56:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17285570929739444942 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[4002 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4001 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2070179934420829206 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4003 01-03 17:56:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0087eeb90 gate 1578074169235215500 evaluation succeeds
[4004 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2070179934420829206 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4005 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4007 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2070179934420829206 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4008 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4006 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4009 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[400a 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[400b 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[400c 01-03 17:56:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes]}
[400d 01-03 17:56:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54
[400e 01-03 17:56:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54
[400f 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4010 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4011 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4012 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[4013 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4014 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4015 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4016 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers
[4017 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4018 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4019 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[401a 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151035
[401b 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D98465D3022093FB6BD2F8124D0E70CE4EB04FB9D3C8E80938F7EBBD4F68EDA2
[401c 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[401d 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[401e 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[401f 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[4020 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4021 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[4022 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[4023 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[4024 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4025 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4026 01-03 17:56:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4027 01-03 17:56:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4028 01-03 17:56:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4029 01-03 17:56:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[402a 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[402b 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[402c 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[402d 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[402e 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[402f 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4030 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 51 75 ed 0a 3b 81 ee 1a e2 17 7d d5 18 42 04 |.Qu..;.....}..B.|
00000010 96 2c d5 1a 1e 1e a7 66 e3 14 58 e8 5e d1 1f 06 |.,.....f..X.^...|
[4031 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ae 8b 8a 57 94 b0 0e f4 89 f2 |0E.!.....W......|
00000010 f5 46 00 34 77 15 36 85 33 ea 78 a0 86 12 0c c0 |.F.4w.6.3.x.....|
00000020 37 ed fb 9e 58 02 20 13 49 b6 13 09 7a 9d 2a b7 |7...X. .I...z.*.|
00000030 5c 9e 5e 6d 55 77 f8 7e 0a 84 e2 5d a2 52 fb f2 |\.^mUw.~...].R..|
00000040 5d 47 63 52 07 f3 9f |]GcR...|
[4032 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4033 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4034 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4035 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4036 01-03 17:56:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4037 01-03 17:56:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4038 01-03 17:56:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4039 01-03 17:56:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[403a 01-03 17:56:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[403b 01-03 17:56:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[403c 01-03 17:56:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[403d 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 a1 24 2e a6 10 f2 ca 0c cf ca de e2 06 88 28 |..$............(|
00000010 a2 cf 64 ee ea df 90 af 2f c7 d7 af 77 00 3c b6 |..d...../...w.<.|
[403e 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc f0 b2 c4 e5 88 8a 5e 51 fd e5 |0E.!........^Q..|
00000010 04 21 cd 49 3f 36 e6 5c a3 66 7a 98 44 e7 84 ef |.!.I?6.\.fz.D...|
00000020 69 b6 0d b3 55 02 20 1d 5e 47 34 ca e9 da ca 45 |i...U. .^G4....E|
00000030 0a 7f cb 5a 69 ea 3d ef d8 83 ba dc e1 7b a1 f7 |...Zi.=......{..|
00000040 b2 09 73 4a 4a 54 9c |..sJJT.|
[403f 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4040 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836580 gate 1578074169406507400 evaluation starts
[4041 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836580 signed by 0 principal evaluation starts (used [false])
[4042 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836580 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4043 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4044 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836580 principal evaluation fails
[4045 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836580 gate 1578074169406507400 evaluation fails
[4046 01-03 17:56:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4047 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4048 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4049 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 a1 24 2e a6 10 f2 ca 0c cf ca de e2 06 88 28 |..$............(|
00000010 a2 cf 64 ee ea df 90 af 2f c7 d7 af 77 00 3c b6 |..d...../...w.<.|
[404a 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc f0 b2 c4 e5 88 8a 5e 51 fd e5 |0E.!........^Q..|
00000010 04 21 cd 49 3f 36 e6 5c a3 66 7a 98 44 e7 84 ef |.!.I?6.\.fz.D...|
00000020 69 b6 0d b3 55 02 20 1d 5e 47 34 ca e9 da ca 45 |i...U. .^G4....E|
00000030 0a 7f cb 5a 69 ea 3d ef d8 83 ba dc e1 7b a1 f7 |...Zi.=......{..|
00000040 b2 09 73 4a 4a 54 9c |..sJJT.|
[404b 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[404c 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836e80 gate 1578074169413540500 evaluation starts
[404d 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836e80 signed by 0 principal evaluation starts (used [false])
[404e 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836e80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[404f 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836e80 principal evaluation succeeds for identity 0
[4050 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008836e80 gate 1578074169413540500 evaluation succeeds
[4051 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4052 01-03 17:56:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4053 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4054 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4055 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[4056 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4057 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4058 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 84 65 d3 02 20 93 fb 6b d2 f8 12 4d 0e 70 ce |..e.. ..k...M.p.|
00000010 4e b0 4f b9 d3 c8 e8 09 38 f7 eb bd 4f 68 ed a2 |N.O.....8...Oh..|
[4059 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 69 4c 65 45 d9 02 33 db 0b 5e |0E.!..iLeE..3..^|
00000010 8b 1f 67 0e 9e c6 7b f8 0c c2 47 7b 3a f9 0f 7f |..g...{...G{:...|
00000020 57 b2 2f 74 05 02 20 16 61 5b 67 c2 55 43 2f 47 |W./t.. .a[g.UC/G|
00000030 aa 2f bf 7b 20 f8 d6 f0 bf d6 69 59 aa b1 1f e5 |./.{ .....iY....|
00000040 cf 98 7f 7a 22 57 e8 |...z"W.|
[405a 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[405b 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[405c 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[405d 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[405e 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[405f 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[4060 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4061 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4062 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4063 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4064 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4065 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4066 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4067 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4068 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4069 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f b2 da 35 c2 93 a9 31 38 89 c6 6d 1b 32 2c f3 |...5...18..m.2,.|
00000010 0a 0d f6 ab d2 36 1f 98 de 47 b1 10 ea 76 37 a7 |.....6...G...v7.|
[406a 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 8a d7 4a 27 27 16 03 6f e7 32 |0E.!....J''..o.2|
00000010 f5 47 b6 c6 e0 10 da c2 8d 15 0d 5e 8b 79 51 75 |.G.........^.yQu|
00000020 09 ad 0a d5 24 02 20 73 68 38 74 29 cf 89 07 88 |....$. sh8t)....|
00000030 e8 39 5c 49 65 26 6f 70 5d f0 a7 be 1e d3 49 b7 |.9\Ie&op].....I.|
00000040 86 e0 6c f8 f5 66 5d |..l..f]|
[406b 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[406c 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00884f760 gate 1578074169428058800 evaluation starts
[406d 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00884f760 signed by 0 principal evaluation starts (used [false])
[406e 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00884f760 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[406f 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00884f760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4070 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00884f760 principal evaluation fails
[4071 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00884f760 gate 1578074169428058800 evaluation fails
[4072 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4073 01-03 17:56:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4074 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4075 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f b2 da 35 c2 93 a9 31 38 89 c6 6d 1b 32 2c f3 |...5...18..m.2,.|
00000010 0a 0d f6 ab d2 36 1f 98 de 47 b1 10 ea 76 37 a7 |.....6...G...v7.|
[4076 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 8a d7 4a 27 27 16 03 6f e7 32 |0E.!....J''..o.2|
00000010 f5 47 b6 c6 e0 10 da c2 8d 15 0d 5e 8b 79 51 75 |.G.........^.yQu|
00000020 09 ad 0a d5 24 02 20 73 68 38 74 29 cf 89 07 88 |....$. sh8t)....|
00000030 e8 39 5c 49 65 26 6f 70 5d f0 a7 be 1e d3 49 b7 |.9\Ie&op].....I.|
00000040 86 e0 6c f8 f5 66 5d |..l..f]|
[4077 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4078 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008864060 gate 1578074169432591700 evaluation starts
[4079 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008864060 signed by 0 principal evaluation starts (used [false])
[407a 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008864060 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[407b 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008864060 principal evaluation succeeds for identity 0
[407c 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008864060 gate 1578074169432591700 evaluation succeeds
[407d 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[407e 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[407f 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4080 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4081 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4082 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4083 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4084 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 51 75 ed 0a 3b 81 ee 1a e2 17 7d d5 18 42 04 |.Qu..;.....}..B.|
00000010 96 2c d5 1a 1e 1e a7 66 e3 14 58 e8 5e d1 1f 06 |.,.....f..X.^...|
[4085 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ae 8b 8a 57 94 b0 0e f4 89 f2 |0E.!.....W......|
00000010 f5 46 00 34 77 15 36 85 33 ea 78 a0 86 12 0c c0 |.F.4w.6.3.x.....|
00000020 37 ed fb 9e 58 02 20 13 49 b6 13 09 7a 9d 2a b7 |7...X. .I...z.*.|
00000030 5c 9e 5e 6d 55 77 f8 7e 0a 84 e2 5d a2 52 fb f2 |\.^mUw.~...].R..|
00000040 5d 47 63 52 07 f3 9f |]GcR...|
[4086 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4087 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4088 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4089 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 84 65 d3 02 20 93 fb 6b d2 f8 12 4d 0e 70 ce |..e.. ..k...M.p.|
00000010 4e b0 4f b9 d3 c8 e8 09 38 f7 eb bd 4f 68 ed a2 |N.O.....8...Oh..|
[408a 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 69 4c 65 45 d9 02 33 db 0b 5e |0E.!..iLeE..3..^|
00000010 8b 1f 67 0e 9e c6 7b f8 0c c2 47 7b 3a f9 0f 7f |..g...{...G{:...|
00000020 57 b2 2f 74 05 02 20 16 61 5b 67 c2 55 43 2f 47 |W./t.. .a[g.UC/G|
00000030 aa 2f bf 7b 20 f8 d6 f0 bf d6 69 59 aa b1 1f e5 |./.{ .....iY....|
00000040 cf 98 7f 7a 22 57 e8 |...z"W.|
[408b 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[408c 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[408d 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[408e 01-03 17:56:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[408f 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4090 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[4091 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4092 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 84 65 d3 02 20 93 fb 6b d2 f8 12 4d 0e 70 ce |..e.. ..k...M.p.|
00000010 4e b0 4f b9 d3 c8 e8 09 38 f7 eb bd 4f 68 ed a2 |N.O.....8...Oh..|
[4093 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 69 4c 65 45 d9 02 33 db 0b 5e |0E.!..iLeE..3..^|
00000010 8b 1f 67 0e 9e c6 7b f8 0c c2 47 7b 3a f9 0f 7f |..g...{...G{:...|
00000020 57 b2 2f 74 05 02 20 16 61 5b 67 c2 55 43 2f 47 |W./t.. .a[g.UC/G|
00000030 aa 2f bf 7b 20 f8 d6 f0 bf d6 69 59 aa b1 1f e5 |./.{ .....iY....|
00000040 cf 98 7f 7a 22 57 e8 |...z"W.|
[4094 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[4095 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 81 c6 3c fe b8 3e 8b b0 e7 e6 |0E.!....<..>....|
00000010 4b 2b 9d 73 48 ed 34 10 ca 35 23 a4 24 e6 60 3b |K+.sH.4..5#.$.`;|
00000020 01 ac 68 c6 63 02 20 6c a7 e2 b1 6f b2 4a 04 3d |..h.c. l...o.J.=|
00000030 75 e5 55 3a 52 c2 d0 84 66 2d ae a3 d3 e8 23 e7 |u.U:R...f-....#.|
00000040 a2 f5 59 43 fc ad 15 |..YC...|
[4096 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4097 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4098 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4099 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[409a 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[409b 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[409c 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[409d 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[409e 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[409f 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[40a0 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40a1 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[40a2 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[40a3 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40a4 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40a5 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40a6 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[40a7 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[40a8 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[40a9 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[40aa 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[40ab 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[40ac 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[40ad 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[40ae 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40af 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889e910 gate 1578074169458919900 evaluation starts
[40b0 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889e910 signed by 0 principal evaluation starts (used [false])
[40b1 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889e910 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[40b2 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889e910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[40b3 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889e910 principal evaluation fails
[40b4 01-03 17:56:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889e910 gate 1578074169458919900 evaluation fails
[40b5 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[40b6 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[40b7 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[40b8 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[40b9 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[40ba 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[40bb 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40bc 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889f210 gate 1578074169463688700 evaluation starts
[40bd 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889f210 signed by 0 principal evaluation starts (used [false])
[40be 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889f210 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[40bf 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889f210 principal evaluation succeeds for identity 0
[40c0 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00889f210 gate 1578074169463688700 evaluation succeeds
[40c1 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[40c2 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[40c3 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[40c4 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[40c5 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[40c6 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[40c7 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[40c8 01-03 17:56:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[40c9 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40ca 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40cb 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[40cc 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[40cd 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[40ce 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[40cf 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[40d0 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[40d1 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[40d2 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[40d3 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40d4 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088b1b30 gate 1578074169472937400 evaluation starts
[40d5 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088b1b30 signed by 0 principal evaluation starts (used [false])
[40d6 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088b1b30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[40d7 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088b1b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[40d8 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088b1b30 principal evaluation fails
[40d9 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088b1b30 gate 1578074169472937400 evaluation fails
[40da 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[40db 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[40dc 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[40dd 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[40de 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[40df 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40e0 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088cc430 gate 1578074169475640800 evaluation starts
[40e1 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088cc430 signed by 0 principal evaluation starts (used [false])
[40e2 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088cc430 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[40e3 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088cc430 principal evaluation succeeds for identity 0
[40e4 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088cc430 gate 1578074169475640800 evaluation succeeds
[40e5 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[40e6 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[40e7 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[40e8 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[40e9 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40ea 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[40eb 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[40ec 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[40ed 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[40ee 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[40ef 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40f0 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40f1 01-03 17:56:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40f2 01-03 17:56:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40f3 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[40f4 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[40f5 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[40f6 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[40f7 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[40f8 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[40f9 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[40fa 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[40fb 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40fc 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eadd0 gate 1578074169488597200 evaluation starts
[40fd 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eadd0 signed by 0 principal evaluation starts (used [false])
[40fe 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eadd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[40ff 01-03 17:56:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eadd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4100 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eadd0 principal evaluation fails
[4101 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eadd0 gate 1578074169488597200 evaluation fails
[4102 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4103 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4104 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4105 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4106 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4107 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4108 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eb6d0 gate 1578074169492645700 evaluation starts
[4109 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eb6d0 signed by 0 principal evaluation starts (used [false])
[410a 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eb6d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[410b 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eb6d0 principal evaluation succeeds for identity 0
[410c 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088eb6d0 gate 1578074169492645700 evaluation succeeds
[410d 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[410e 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[410f 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4110 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4111 01-03 17:56:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4112 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4113 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4114 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4115 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4116 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4117 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4118 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4119 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[411a 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[411b 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[411c 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fb130 gate 1578074169504543200 evaluation starts
[411d 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fb130 signed by 0 principal evaluation starts (used [false])
[411e 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fb130 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[411f 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fb130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4120 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fb130 principal evaluation fails
[4121 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fb130 gate 1578074169504543200 evaluation fails
[4122 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4123 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4124 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4125 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4126 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4127 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4128 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fba30 gate 1578074169508578900 evaluation starts
[4129 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fba30 signed by 0 principal evaluation starts (used [false])
[412a 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fba30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[412b 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fba30 principal evaluation succeeds for identity 0
[412c 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0088fba30 gate 1578074169508578900 evaluation succeeds
[412d 01-03 17:56:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[412e 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[412f 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4130 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4131 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4132 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4133 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4134 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4135 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4136 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4137 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4138 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4139 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[413a 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[413b 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[413c 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[413d 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[413e 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[413f 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008913740 gate 1578074169516802900 evaluation starts
[4140 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008913740 signed by 0 principal evaluation starts (used [false])
[4141 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008913740 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4142 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008913740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4143 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008913740 principal evaluation fails
[4144 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008913740 gate 1578074169516802900 evaluation fails
[4145 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4146 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4147 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4148 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4149 01-03 17:56:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[414a 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[414b 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008928040 gate 1578074169520650500 evaluation starts
[414c 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008928040 signed by 0 principal evaluation starts (used [false])
[414d 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008928040 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[414e 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008928040 principal evaluation succeeds for identity 0
[414f 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008928040 gate 1578074169520650500 evaluation succeeds
[4150 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4151 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4152 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4153 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4154 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4155 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4156 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4157 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4158 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4159 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[415a 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[415b 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[415c 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[415d 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[415e 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[415f 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4160 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4161 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944150 gate 1578074169527481000 evaluation starts
[4162 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944150 signed by 0 principal evaluation starts (used [false])
[4163 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944150 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4164 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4165 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944150 principal evaluation fails
[4166 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944150 gate 1578074169527481000 evaluation fails
[4167 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4168 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4169 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[416a 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[416b 01-03 17:56:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[416c 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[416d 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944a50 gate 1578074169530834400 evaluation starts
[416e 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944a50 signed by 0 principal evaluation starts (used [false])
[416f 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944a50 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4170 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944a50 principal evaluation succeeds for identity 0
[4171 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008944a50 gate 1578074169530834400 evaluation succeeds
[4172 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4173 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4174 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4175 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4176 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4177 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4178 01-03 17:56:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4179 01-03 17:56:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[417a 01-03 17:56:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[417b 01-03 17:56:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[417c 01-03 17:56:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[417d 01-03 17:56:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[417e 01-03 17:56:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12899850483908783045 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[417f 01-03 17:56:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12899850483908783045 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4180 01-03 17:56:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4181 01-03 17:56:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12899850483908783045 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[4182 01-03 17:56:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12899850483908783045 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[4183 01-03 17:56:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4184 01-03 17:56:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[4185 01-03 17:56:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4186 01-03 17:56:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4187 01-03 17:56:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4188 01-03 17:56:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18246925782230454986 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4189 01-03 17:56:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18246925782230454986 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[418a 01-03 17:56:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[418b 01-03 17:56:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[418c 01-03 17:56:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[418d 01-03 17:56:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[418e 01-03 17:56:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[418f 01-03 17:56:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4190 01-03 17:56:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4191 01-03 17:56:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4192 01-03 17:56:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[4193 01-03 17:56:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[4194 01-03 17:56:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4195 01-03 17:56:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4196 01-03 17:56:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4197 01-03 17:56:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4198 01-03 17:56:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[4199 01-03 17:56:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[419a 01-03 17:56:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510121801
[419b 01-03 17:56:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E30D90B68BEF3DFB97583FBA7EE5D90AA9A49EBF6F00757CDBB449DA8B410627
[419c 01-03 17:56:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[419d 01-03 17:56:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[419e 01-03 17:56:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[419f 01-03 17:56:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41a0 01-03 17:56:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41a1 01-03 17:56:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:18 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[41a2 01-03 17:56:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41a3 01-03 17:56:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:18 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[41a4 01-03 17:56:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41a5 01-03 17:56:11.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41a6 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[41a7 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41a8 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[41a9 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[41aa 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 74 3b 62 84 68 80 ed 69 42 45 85 f1 8d ca 62 |.t;b.h..iBE....b|
00000010 2c 45 3c 30 8a b2 14 f5 f8 5a 4b 38 cc f5 01 d4 |,E<0.....ZK8....|
[41ab 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d cb 4a 4e 9d f2 b2 b9 ec e5 eb |0E.!...JN.......|
00000010 0c 2c a5 da 5e dc 0e e9 da fd 33 19 b5 4c c9 1d |.,..^.....3..L..|
00000020 ca a7 bd 00 23 02 20 5a 8b 5d a9 ba 2f e0 40 e3 |....#. Z.]../.@.|
00000030 c7 de e7 4e ef 11 49 d6 81 23 04 ec 88 bf fe 63 |...N..I..#.....c|
00000040 8b e0 e1 0b 74 f2 4c |....t.L|
[41ac 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[41ad 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 5e 2d 4c 71 df 1c 50 de a7 f9 23 |0D. ^-Lq..P...#|
00000010 f1 5a 96 a7 a1 38 37 77 e1 8e 39 85 27 37 72 57 |.Z...87w..9.'7rW|
00000020 ae 0a 85 bc 02 20 70 3c 0d c0 e1 50 35 6f 91 ea |..... p<...P5o..|
00000030 b2 53 a2 2b 58 fb fb f0 9e 60 19 92 5f a7 20 0f |.S.+X....`.._. .|
00000040 a6 bf df c3 f9 57 |.....W|
[41ae 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[41af 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[41b0 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57
[41b1 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57
[41b2 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[41b3 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41b4 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41b5 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41b6 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41b7 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41b8 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41b9 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[41ba 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41bb 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[41bc 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[41bd 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41be 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[41bf 01-03 17:56:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41c0 01-03 17:56:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[41c1 01-03 17:56:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[41c2 01-03 17:56:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41c3 01-03 17:56:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[41c4 01-03 17:56:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41c5 01-03 17:56:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:6189590688554333645 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[41c6 01-03 17:56:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6189590688554333645 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[41c7 01-03 17:56:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[41c8 01-03 17:56:11.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41c9 01-03 17:56:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[41ca 01-03 17:56:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41cb 01-03 17:56:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[41cc 01-03 17:56:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[41cd 01-03 17:56:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 58 94 69 be 89 37 6c cd b4 66 8e 4d 2e 4f 94 |.X.i..7l..f.M.O.|
00000010 a9 63 8a 39 03 8f 3a 50 ac 26 57 34 3c f2 b4 da |.c.9..:P.&W4<...|
[41ce 01-03 17:56:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 2b 6c fd 90 13 fe 27 54 ac 0c |0E.!..+l....'T..|
00000010 8c 4d 81 1e 8c 20 64 74 3e 74 29 48 b0 00 ec 16 |.M... dt>t)H....|
00000020 91 d5 61 7c fb 02 20 63 86 c8 ec 7c 60 1a a7 43 |..a|.. c...|`..C|
00000030 b5 9d bf 99 fe c0 32 d3 9e 5c 0f 96 5f 8a 3e d0 |......2..\.._.>.|
00000040 b2 2d 56 25 c3 b0 b0 |.-V%...|
[41cf 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[41d0 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 7c ea fd ae b2 fc ce 96 ac 0f |0E.!..|.........|
00000010 59 27 7c b8 1b 9b e8 7a cc b4 29 1e 6d 41 4d c9 |Y'|....z..).mAM.|
00000020 33 8e 36 92 63 02 20 58 d9 7e 63 88 37 b5 4b 1f |3.6.c. X.~c.7.K.|
00000030 ae 35 a5 0f 3a 05 3d 78 92 16 53 e2 7c 1a eb 52 |.5..:.=x..S.|..R|
00000040 f9 42 aa 49 87 f2 9e |.B.I...|
[41d1 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[41d2 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[41d3 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58
[41d4 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58
[41d5 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[41d6 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41d7 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41d8 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41d9 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[41da 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41db 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41dc 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[41dd 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[41de 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[41df 01-03 17:56:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41e0 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[41e1 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[41e2 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41e3 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[41e4 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[41e5 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41e6 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[41e7 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[41e8 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[41e9 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[41ea 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[41eb 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[41ec 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 79 8d 79 e4 34 d1 36 9e bc ae 3b f4 e1 9e 6a |.y.y.4.6...;...j|
00000010 15 41 d0 55 70 80 83 e7 5b 2a d6 a4 1b da cc 34 |.A.Up...[*.....4|
[41ed 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 76 d4 e4 74 85 5b 49 d2 cc 0b 62 |0D. (v..t.[I...b|
00000010 b8 ab 82 84 84 b4 9d 9d 87 2f 29 1a 0b 98 39 fb |........./)...9.|
00000020 ae 58 10 e1 02 20 46 c9 86 01 22 2b 25 53 77 62 |.X... F..."+%Swb|
00000030 b1 c9 da c8 b4 8f c3 5a fe 06 b4 1d d9 39 bc 5b |.......Z.....9.[|
00000040 fb cd 2f e9 85 2a |../..*|
[41ee 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[41ef 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089adb20 gate 1578074172985250900 evaluation starts
[41f0 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089adb20 signed by 0 principal evaluation starts (used [false])
[41f1 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089adb20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[41f2 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089adb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[41f3 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089adb20 principal evaluation fails
[41f4 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089adb20 gate 1578074172985250900 evaluation fails
[41f5 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[41f6 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[41f7 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[41f8 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 79 8d 79 e4 34 d1 36 9e bc ae 3b f4 e1 9e 6a |.y.y.4.6...;...j|
00000010 15 41 d0 55 70 80 83 e7 5b 2a d6 a4 1b da cc 34 |.A.Up...[*.....4|
[41f9 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 76 d4 e4 74 85 5b 49 d2 cc 0b 62 |0D. (v..t.[I...b|
00000010 b8 ab 82 84 84 b4 9d 9d 87 2f 29 1a 0b 98 39 fb |........./)...9.|
00000020 ae 58 10 e1 02 20 46 c9 86 01 22 2b 25 53 77 62 |.X... F..."+%Swb|
00000030 b1 c9 da c8 b4 8f c3 5a fe 06 b4 1d d9 39 bc 5b |.......Z.....9.[|
00000040 fb cd 2f e9 85 2a |../..*|
[41fa 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[41fb 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e4420 gate 1578074172986145900 evaluation starts
[41fc 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e4420 signed by 0 principal evaluation starts (used [false])
[41fd 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e4420 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[41fe 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e4420 principal evaluation succeeds for identity 0
[41ff 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e4420 gate 1578074172986145900 evaluation succeeds
[4200 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4201 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4202 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4203 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4204 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[4205 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes]}
[4206 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55
[4207 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55
[4208 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4209 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[420a 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[420b 01-03 17:56:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[420c 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[420d 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[420e 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[420f 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4210 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4211 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4212 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4213 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4214 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4215 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4216 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[4217 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4218 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[4219 01-03 17:56:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[421a 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[421b 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[421c 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[421d 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[421e 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[421f 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[4220 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4221 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[4222 01-03 17:56:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4223 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:10973184116271991335 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4224 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:10973184116271991335 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4225 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10973184116271991335 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4226 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4227 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4228 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4229 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[422a 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[422b 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[422c 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[422d 01-03 17:56:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[422e 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:16132609698412082013 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[422f 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:16132609698412082013 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4230 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16132609698412082013 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4231 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4232 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4233 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4234 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4235 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4236 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4237 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[4238 01-03 17:56:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4239 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[423a 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[423b 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[423c 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[423d 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[423e 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[423f 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4240 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4241 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4242 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4243 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4244 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4245 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 dc a9 9b 70 22 ab f6 80 38 2a be 46 3b d5 33 |....p"...8*.F;.3|
00000010 6a f6 db 9e 0e fb 27 d5 f6 fe 42 b8 18 6a 1c d0 |j.....'...B..j..|
[4246 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 b8 23 43 d4 5f e9 bb 91 6b 5e |0E.!...#C._...k^|
00000010 44 e5 da 3b c2 be a4 3e 8f 24 fd 78 b9 3c a7 0a |D..;...>.$.x.<..|
00000020 28 42 56 7e b9 02 20 54 87 91 61 e4 46 82 c0 17 |(BV~.. T..a.F...|
00000030 c9 92 c9 39 3e 55 ba 18 c3 73 c3 15 c9 f5 53 49 |...9>U...s....SI|
00000040 be d2 87 0b 91 4b 19 |.....K.|
[4247 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4248 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a30220 gate 1578074173082656500 evaluation starts
[4249 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a30220 signed by 0 principal evaluation starts (used [false])
[424a 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a30220 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[424b 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a30220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[424c 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a30220 principal evaluation fails
[424d 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a30220 gate 1578074173082656500 evaluation fails
[424e 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[424f 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4250 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4251 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 dc a9 9b 70 22 ab f6 80 38 2a be 46 3b d5 33 |....p"...8*.F;.3|
00000010 6a f6 db 9e 0e fb 27 d5 f6 fe 42 b8 18 6a 1c d0 |j.....'...B..j..|
[4252 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 b8 23 43 d4 5f e9 bb 91 6b 5e |0E.!...#C._...k^|
00000010 44 e5 da 3b c2 be a4 3e 8f 24 fd 78 b9 3c a7 0a |D..;...>.$.x.<..|
00000020 28 42 56 7e b9 02 20 54 87 91 61 e4 46 82 c0 17 |(BV~.. T..a.F...|
00000030 c9 92 c9 39 3e 55 ba 18 c3 73 c3 15 c9 f5 53 49 |...9>U...s....SI|
00000040 be d2 87 0b 91 4b 19 |.....K.|
[4253 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4254 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e5c50 gate 1578074173084354400 evaluation starts
[4255 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e5c50 signed by 0 principal evaluation starts (used [false])
[4256 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e5c50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4257 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e5c50 principal evaluation succeeds for identity 0
[4258 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0089e5c50 gate 1578074173084354400 evaluation succeeds
[4259 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[425a 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[425b 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[425c 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[425d 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[425e 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes]}
[425f 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57
[4260 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57
[4261 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4262 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4263 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4264 01-03 17:56:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4265 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4266 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4267 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4268 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4269 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[426a 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[426b 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[426c 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[426d 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[426e 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[426f 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[4270 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4271 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[4272 01-03 17:56:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4273 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[4274 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[4275 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4276 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[4277 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4278 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[4279 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[427a 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[427b 01-03 17:56:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[427c 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[427d 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[427e 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[427f 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4280 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4281 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4282 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4283 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4284 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4285 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4286 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4287 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4288 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 99 2f 43 e3 23 33 08 ea 6a 11 93 b8 66 b0 05 |../C.#3..j...f..|
00000010 72 66 ce 53 f8 03 b0 a6 cd d6 02 87 bf 5a 28 69 |rf.S.........Z(i|
[4289 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 a4 1e 1e 57 62 a7 93 83 60 73 20 |0D. a...Wb...`s |
00000010 6f 4d e5 b9 b0 05 e0 c4 7c 7b a5 64 71 a1 48 1c |oM......|{.dq.H.|
00000020 c3 ff 16 75 02 20 50 42 26 24 5c d1 e5 c4 b5 fc |...u. PB&$\.....|
00000030 73 4f ee 76 36 f9 3f be af 02 48 fc cf 62 96 7e |sO.v6.?...H..b.~|
00000040 5d eb 3a fb 37 92 |].:.7.|
[428a 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[428b 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a596e0 gate 1578074173122292400 evaluation starts
[428c 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a596e0 signed by 0 principal evaluation starts (used [false])
[428d 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a596e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[428e 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a596e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[428f 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a596e0 principal evaluation fails
[4290 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a596e0 gate 1578074173122292400 evaluation fails
[4291 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4292 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4293 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4294 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 99 2f 43 e3 23 33 08 ea 6a 11 93 b8 66 b0 05 |../C.#3..j...f..|
00000010 72 66 ce 53 f8 03 b0 a6 cd d6 02 87 bf 5a 28 69 |rf.S.........Z(i|
[4295 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 a4 1e 1e 57 62 a7 93 83 60 73 20 |0D. a...Wb...`s |
00000010 6f 4d e5 b9 b0 05 e0 c4 7c 7b a5 64 71 a1 48 1c |oM......|{.dq.H.|
00000020 c3 ff 16 75 02 20 50 42 26 24 5c d1 e5 c4 b5 fc |...u. PB&$\.....|
00000030 73 4f ee 76 36 f9 3f be af 02 48 fc cf 62 96 7e |sO.v6.?...H..b.~|
00000040 5d eb 3a fb 37 92 |].:.7.|
[4296 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4297 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a59fe0 gate 1578074173122877200 evaluation starts
[4298 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a59fe0 signed by 0 principal evaluation starts (used [false])
[4299 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a59fe0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[429a 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a59fe0 principal evaluation succeeds for identity 0
[429b 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a59fe0 gate 1578074173122877200 evaluation succeeds
[429c 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[429d 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[429e 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[429f 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[42a0 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[42a1 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes]}
[42a2 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58
[42a3 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58
[42a4 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[42a5 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42a6 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42a7 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42a8 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[42a9 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42aa 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42ab 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42ac 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[42ad 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[42ae 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[42af 01-03 17:56:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42b0 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[42b1 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[42b2 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42b3 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[42b4 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[42b5 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42b6 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[42b7 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[42b8 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[42b9 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[42ba 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[42bb 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[42bc 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 1d e0 f3 42 8a b1 9b 2a ce e4 76 81 b8 63 59 |"...B...*..v..cY|
00000010 41 d7 1f 4a 8b e8 6b 0b 45 6d 86 b6 2b 6a da a5 |A..J..k.Em..+j..|
[42bd 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 f6 c7 1b 4b 1f 10 d2 e2 78 af |0E.!.....K....x.|
00000010 b0 75 4d 40 61 aa 1c 57 3b 0c 05 18 54 e6 f3 57 |.uM@a..W;...T..W|
00000020 cf 9a 17 81 5d 02 20 56 dd 6d 4e fc ff 1b 5f ff |....]. V.mN..._.|
00000030 79 1f 14 4b 9f 64 f0 d1 df 0d 3d 36 6e 04 08 b9 |y..K.d....=6n...|
00000040 61 ce d0 08 b3 b3 ea |a......|
[42be 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[42bf 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a82f00 gate 1578074173156323200 evaluation starts
[42c0 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a82f00 signed by 0 principal evaluation starts (used [false])
[42c1 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a82f00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[42c2 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a82f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[42c3 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a82f00 principal evaluation fails
[42c4 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a82f00 gate 1578074173156323200 evaluation fails
[42c5 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[42c6 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[42c7 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[42c8 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 1d e0 f3 42 8a b1 9b 2a ce e4 76 81 b8 63 59 |"...B...*..v..cY|
00000010 41 d7 1f 4a 8b e8 6b 0b 45 6d 86 b6 2b 6a da a5 |A..J..k.Em..+j..|
[42c9 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 f6 c7 1b 4b 1f 10 d2 e2 78 af |0E.!.....K....x.|
00000010 b0 75 4d 40 61 aa 1c 57 3b 0c 05 18 54 e6 f3 57 |.uM@a..W;...T..W|
00000020 cf 9a 17 81 5d 02 20 56 dd 6d 4e fc ff 1b 5f ff |....]. V.mN..._.|
00000030 79 1f 14 4b 9f 64 f0 d1 df 0d 3d 36 6e 04 08 b9 |y..K.d....=6n...|
00000040 61 ce d0 08 b3 b3 ea |a......|
[42ca 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[42cb 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a83800 gate 1578074173156736100 evaluation starts
[42cc 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a83800 signed by 0 principal evaluation starts (used [false])
[42cd 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a83800 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[42ce 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a83800 principal evaluation succeeds for identity 0
[42cf 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008a83800 gate 1578074173156736100 evaluation succeeds
[42d0 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[42d1 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[42d2 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[42d3 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[42d4 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[42d5 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes]}
[42d6 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56
[42d7 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56
[42d8 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[42d9 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42da 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42db 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42dc 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[42dd 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42de 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42df 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42e0 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[42e1 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[42e2 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[42e3 01-03 17:56:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42e4 01-03 17:56:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[42e5 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151036
[42e6 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[42e7 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 33C95E59A2DA0B1FCAC22C115A9D1BDFB86B76F0823EE5E7BFCB760B5F8A996B
[42e8 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9696991220318228666 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[42e9 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[42ea 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[42eb 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[42ec 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17695576508468342100 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[42ed 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[42ee 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[42ef 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8073390236720257677 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[42f0 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9696991220318228666 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[42f1 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42f2 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8073390236720257677 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[42f3 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42f4 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17695576508468342100 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[42f5 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42f6 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17695576508468342100 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[42f7 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17695576508468342100 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[42f8 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42f9 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9696991220318228666 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[42fa 01-03 17:56:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9696991220318228666 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[42fb 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9696991220318228666 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[42fc 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42fd 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42fe 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42ff 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4300 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4301 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[4302 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4303 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4304 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[4305 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[4306 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4307 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4308 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4309 01-03 17:56:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[430a 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8073390236720257677 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[430b 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8073390236720257677 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[430c 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8073390236720257677 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[430d 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[430e 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[430f 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[4310 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4311 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[4312 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4313 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 c9 5e 59 a2 da 0b 1f ca c2 2c 11 5a 9d 1b df |3.^Y......,.Z...|
00000010 b8 6b 76 f0 82 3e e5 e7 bf cb 76 0b 5f 8a 99 6b |.kv..>....v._..k|
[4314 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 a9 41 79 d4 48 f9 fc 60 82 57 b0 |0D. d.Ay.H..`.W.|
00000010 75 9e ba f3 9d 63 c2 c7 1e 7a d9 3b d4 50 79 7f |u....c...z.;.Py.|
00000020 4b d5 98 7d 02 20 1c b6 63 58 d8 ff 44 e3 06 7b |K..}. ..cX..D..{|
00000030 50 8d 4e 12 e0 b8 f0 05 ae 7c 22 3a c5 ce ee f4 |P.N......|":....|
00000040 42 95 d5 cd 5a 27 |B...Z'|
[4315 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[4316 01-03 17:56:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4317 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151037
[4318 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D73F1C3EEAF64F61B68E794A3545A2D3A34F2BA54B153F0AE9F8A5D3DBEDEE3D
[4319 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[431a 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[431b 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[431c 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[431d 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[431e 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[431f 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[4320 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[4321 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4322 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4323 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4324 01-03 17:56:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4325 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4326 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[4327 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4328 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[4329 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[432a 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3f 1c 3e ea f6 4f 61 b6 8e 79 4a 35 45 a2 d3 |.?.>..Oa..yJ5E..|
00000010 a3 4f 2b a5 4b 15 3f 0a e9 f8 a5 d3 db ed ee 3d |.O+.K.?........=|
[432b 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 73 12 c8 38 5e 99 4f dc 53 2f |0E.!..s..8^.O.S/|
00000010 e2 1c 4d 62 60 ae 5b 31 92 74 2a b4 5f ac 53 5b |..Mb`.[1.t*._.S[|
00000020 de 65 a2 49 0a 02 20 12 86 4e 39 a0 95 18 9a 85 |.e.I.. ..N9.....|
00000030 4e 2e 47 94 ac d9 3b 2f fb 25 9a 82 97 c2 bc 55 |N.G...;/.%.....U|
00000040 f6 98 92 54 ff 53 9d |...T.S.|
[432c 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[432d 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 66 eb ef b6 5b 87 41 19 52 ba |0E.!..f...[.A.R.|
00000010 d2 48 20 fc 7c d0 bc dc 51 0e 36 8f 18 89 f9 44 |.H .|...Q.6....D|
00000020 07 39 ba 50 24 02 20 13 35 5b 80 d9 5e 36 6f e5 |.9.P$. .5[..^6o.|
00000030 1d ef 87 bf bd 09 98 37 a3 e7 8f 5b ed 2c e2 32 |.......7...[.,.2|
00000040 0b 89 a3 8e 9a 52 81 |.....R.|
[432e 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[432f 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4330 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4331 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4332 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4333 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4334 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4335 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4336 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4337 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4338 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4339 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[433a 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[433b 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[433c 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[433d 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[433e 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 1d e0 f3 42 8a b1 9b 2a ce e4 76 81 b8 63 59 |"...B...*..v..cY|
00000010 41 d7 1f 4a 8b e8 6b 0b 45 6d 86 b6 2b 6a da a5 |A..J..k.Em..+j..|
[433f 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 f6 c7 1b 4b 1f 10 d2 e2 78 af |0E.!.....K....x.|
00000010 b0 75 4d 40 61 aa 1c 57 3b 0c 05 18 54 e6 f3 57 |.uM@a..W;...T..W|
00000020 cf 9a 17 81 5d 02 20 56 dd 6d 4e fc ff 1b 5f ff |....]. V.mN..._.|
00000030 79 1f 14 4b 9f 64 f0 d1 df 0d 3d 36 6e 04 08 b9 |y..K.d....=6n...|
00000040 61 ce d0 08 b3 b3 ea |a......|
[4340 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4341 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00060 gate 1578074173316357200 evaluation starts
[4342 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00060 signed by 0 principal evaluation starts (used [false])
[4343 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00060 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4344 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4345 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00060 principal evaluation fails
[4346 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00060 gate 1578074173316357200 evaluation fails
[4347 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4348 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4349 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[434a 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 1d e0 f3 42 8a b1 9b 2a ce e4 76 81 b8 63 59 |"...B...*..v..cY|
00000010 41 d7 1f 4a 8b e8 6b 0b 45 6d 86 b6 2b 6a da a5 |A..J..k.Em..+j..|
[434b 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 f6 c7 1b 4b 1f 10 d2 e2 78 af |0E.!.....K....x.|
00000010 b0 75 4d 40 61 aa 1c 57 3b 0c 05 18 54 e6 f3 57 |.uM@a..W;...T..W|
00000020 cf 9a 17 81 5d 02 20 56 dd 6d 4e fc ff 1b 5f ff |....]. V.mN..._.|
00000030 79 1f 14 4b 9f 64 f0 d1 df 0d 3d 36 6e 04 08 b9 |y..K.d....=6n...|
00000040 61 ce d0 08 b3 b3 ea |a......|
[434c 01-03 17:56:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[434d 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00960 gate 1578074173316954400 evaluation starts
[434e 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00960 signed by 0 principal evaluation starts (used [false])
[434f 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00960 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4350 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00960 principal evaluation succeeds for identity 0
[4351 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b00960 gate 1578074173316954400 evaluation succeeds
[4352 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4353 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4354 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4355 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4356 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4357 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4358 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4359 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3f 1c 3e ea f6 4f 61 b6 8e 79 4a 35 45 a2 d3 |.?.>..Oa..yJ5E..|
00000010 a3 4f 2b a5 4b 15 3f 0a e9 f8 a5 d3 db ed ee 3d |.O+.K.?........=|
[435a 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 73 12 c8 38 5e 99 4f dc 53 2f |0E.!..s..8^.O.S/|
00000010 e2 1c 4d 62 60 ae 5b 31 92 74 2a b4 5f ac 53 5b |..Mb`.[1.t*._.S[|
00000020 de 65 a2 49 0a 02 20 12 86 4e 39 a0 95 18 9a 85 |.e.I.. ..N9.....|
00000030 4e 2e 47 94 ac d9 3b 2f fb 25 9a 82 97 c2 bc 55 |N.G...;/.%.....U|
00000040 f6 98 92 54 ff 53 9d |...T.S.|
[435b 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[435c 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[435d 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[435e 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[435f 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 58 94 69 be 89 37 6c cd b4 66 8e 4d 2e 4f 94 |.X.i..7l..f.M.O.|
00000010 a9 63 8a 39 03 8f 3a 50 ac 26 57 34 3c f2 b4 da |.c.9..:P.&W4<...|
[4360 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 2b 6c fd 90 13 fe 27 54 ac 0c |0E.!..+l....'T..|
00000010 8c 4d 81 1e 8c 20 64 74 3e 74 29 48 b0 00 ec 16 |.M... dt>t)H....|
00000020 91 d5 61 7c fb 02 20 63 86 c8 ec 7c 60 1a a7 43 |..a|.. c...|`..C|
00000030 b5 9d bf 99 fe c0 32 d3 9e 5c 0f 96 5f 8a 3e d0 |......2..\.._.>.|
00000040 b2 2d 56 25 c3 b0 b0 |.-V%...|
[4361 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4362 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4363 01-03 17:56:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4364 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4365 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4366 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4367 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4368 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4369 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[436a 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[436b 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[436c 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[436d 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[436e 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[436f 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4370 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 99 2f 43 e3 23 33 08 ea 6a 11 93 b8 66 b0 05 |../C.#3..j...f..|
00000010 72 66 ce 53 f8 03 b0 a6 cd d6 02 87 bf 5a 28 69 |rf.S.........Z(i|
[4371 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 a4 1e 1e 57 62 a7 93 83 60 73 20 |0D. a...Wb...`s |
00000010 6f 4d e5 b9 b0 05 e0 c4 7c 7b a5 64 71 a1 48 1c |oM......|{.dq.H.|
00000020 c3 ff 16 75 02 20 50 42 26 24 5c d1 e5 c4 b5 fc |...u. PB&$\.....|
00000030 73 4f ee 76 36 f9 3f be af 02 48 fc cf 62 96 7e |sO.v6.?...H..b.~|
00000040 5d eb 3a fb 37 92 |].:.7.|
[4372 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4373 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30210 gate 1578074173335713400 evaluation starts
[4374 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30210 signed by 0 principal evaluation starts (used [false])
[4375 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30210 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4376 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4377 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30210 principal evaluation fails
[4378 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30210 gate 1578074173335713400 evaluation fails
[4379 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[437a 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[437b 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[437c 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 99 2f 43 e3 23 33 08 ea 6a 11 93 b8 66 b0 05 |../C.#3..j...f..|
00000010 72 66 ce 53 f8 03 b0 a6 cd d6 02 87 bf 5a 28 69 |rf.S.........Z(i|
[437d 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 a4 1e 1e 57 62 a7 93 83 60 73 20 |0D. a...Wb...`s |
00000010 6f 4d e5 b9 b0 05 e0 c4 7c 7b a5 64 71 a1 48 1c |oM......|{.dq.H.|
00000020 c3 ff 16 75 02 20 50 42 26 24 5c d1 e5 c4 b5 fc |...u. PB&$\.....|
00000030 73 4f ee 76 36 f9 3f be af 02 48 fc cf 62 96 7e |sO.v6.?...H..b.~|
00000040 5d eb 3a fb 37 92 |].:.7.|
[437e 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[437f 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30b10 gate 1578074173336366100 evaluation starts
[4380 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30b10 signed by 0 principal evaluation starts (used [false])
[4381 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30b10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4382 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30b10 principal evaluation succeeds for identity 0
[4383 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b30b10 gate 1578074173336366100 evaluation succeeds
[4384 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4385 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4386 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4387 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4388 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[4389 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[438a 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[438b 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 58 94 69 be 89 37 6c cd b4 66 8e 4d 2e 4f 94 |.X.i..7l..f.M.O.|
00000010 a9 63 8a 39 03 8f 3a 50 ac 26 57 34 3c f2 b4 da |.c.9..:P.&W4<...|
[438c 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 2b 6c fd 90 13 fe 27 54 ac 0c |0E.!..+l....'T..|
00000010 8c 4d 81 1e 8c 20 64 74 3e 74 29 48 b0 00 ec 16 |.M... dt>t)H....|
00000020 91 d5 61 7c fb 02 20 63 86 c8 ec 7c 60 1a a7 43 |..a|.. c...|`..C|
00000030 b5 9d bf 99 fe c0 32 d3 9e 5c 0f 96 5f 8a 3e d0 |......2..\.._.>.|
00000040 b2 2d 56 25 c3 b0 b0 |.-V%...|
[438d 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[438e 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[438f 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4390 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3f 1c 3e ea f6 4f 61 b6 8e 79 4a 35 45 a2 d3 |.?.>..Oa..yJ5E..|
00000010 a3 4f 2b a5 4b 15 3f 0a e9 f8 a5 d3 db ed ee 3d |.O+.K.?........=|
[4391 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 73 12 c8 38 5e 99 4f dc 53 2f |0E.!..s..8^.O.S/|
00000010 e2 1c 4d 62 60 ae 5b 31 92 74 2a b4 5f ac 53 5b |..Mb`.[1.t*._.S[|
00000020 de 65 a2 49 0a 02 20 12 86 4e 39 a0 95 18 9a 85 |.e.I.. ..N9.....|
00000030 4e 2e 47 94 ac d9 3b 2f fb 25 9a 82 97 c2 bc 55 |N.G...;/.%.....U|
00000040 f6 98 92 54 ff 53 9d |...T.S.|
[4392 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[4393 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[4394 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4395 01-03 17:56:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4396 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4397 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4398 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[4399 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[439a 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[439b 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[439c 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[439d 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[439e 01-03 17:56:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[439f 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[43a0 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[43a1 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[43a2 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[43a3 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[43a4 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43a5 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43a6 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[43a7 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[43a8 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[43a9 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[43aa 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[43ab 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[43ac 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[43ad 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[43ae 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[43af 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b633f0 gate 1578074173458157300 evaluation starts
[43b0 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b633f0 signed by 0 principal evaluation starts (used [false])
[43b1 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b633f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[43b2 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b633f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[43b3 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b633f0 principal evaluation fails
[43b4 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b633f0 gate 1578074173458157300 evaluation fails
[43b5 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[43b6 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[43b7 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[43b8 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[43b9 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[43ba 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[43bb 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b63cf0 gate 1578074173458650300 evaluation starts
[43bc 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b63cf0 signed by 0 principal evaluation starts (used [false])
[43bd 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b63cf0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[43be 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b63cf0 principal evaluation succeeds for identity 0
[43bf 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b63cf0 gate 1578074173458650300 evaluation succeeds
[43c0 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[43c1 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[43c2 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[43c3 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[43c4 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43c5 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43c6 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[43c7 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[43c8 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[43c9 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[43ca 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[43cb 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[43cc 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[43cd 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[43ce 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[43cf 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b77750 gate 1578074173459634300 evaluation starts
[43d0 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b77750 signed by 0 principal evaluation starts (used [false])
[43d1 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b77750 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[43d2 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b77750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[43d3 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b77750 principal evaluation fails
[43d4 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b77750 gate 1578074173459634300 evaluation fails
[43d5 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[43d6 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[43d7 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[43d8 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[43d9 01-03 17:56:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[43da 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[43db 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b90050 gate 1578074173460072300 evaluation starts
[43dc 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b90050 signed by 0 principal evaluation starts (used [false])
[43dd 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b90050 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[43de 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b90050 principal evaluation succeeds for identity 0
[43df 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b90050 gate 1578074173460072300 evaluation succeeds
[43e0 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[43e1 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[43e2 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[43e3 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[43e4 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43e5 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[43e6 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[43e7 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43e8 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43e9 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43ea 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[43eb 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[43ec 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[43ed 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[43ee 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[43ef 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[43f0 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[43f1 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[43f2 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[43f3 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b91e90 gate 1578074173461212400 evaluation starts
[43f4 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b91e90 signed by 0 principal evaluation starts (used [false])
[43f5 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[43f6 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b91e90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[43f7 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b91e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[43f8 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b91e90 principal evaluation fails
[43f9 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b91e90 gate 1578074173461212400 evaluation fails
[43fa 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[43fb 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[43fc 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[43fd 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[43fe 01-03 17:56:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[43ff 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4400 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ba6790 gate 1578074173470368200 evaluation starts
[4401 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ba6790 signed by 0 principal evaluation starts (used [false])
[4402 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ba6790 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4403 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ba6790 principal evaluation succeeds for identity 0
[4404 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ba6790 gate 1578074173470368200 evaluation succeeds
[4405 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4406 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4407 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4408 01-03 17:56:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4409 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[440a 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[440b 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[440c 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[440d 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[440e 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[440f 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4410 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4411 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4412 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4413 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4414 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4415 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4416 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc28a0 gate 1578074173484641800 evaluation starts
[4417 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc28a0 signed by 0 principal evaluation starts (used [false])
[4418 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc28a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4419 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc28a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[441a 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc28a0 principal evaluation fails
[441b 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc28a0 gate 1578074173484641800 evaluation fails
[441c 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[441d 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[441e 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[441f 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4420 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4421 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4422 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc31a0 gate 1578074173485095600 evaluation starts
[4423 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc31a0 signed by 0 principal evaluation starts (used [false])
[4424 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc31a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4425 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc31a0 principal evaluation succeeds for identity 0
[4426 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bc31a0 gate 1578074173485095600 evaluation succeeds
[4427 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4428 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4429 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[442a 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[442b 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[442c 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[442d 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[442e 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[442f 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4430 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4431 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4432 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4433 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4434 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4435 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4436 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4437 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4438 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4439 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[443a 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[443b 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5560 gate 1578074173486349700 evaluation starts
[443c 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5560 signed by 0 principal evaluation starts (used [false])
[443d 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5560 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[443e 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[443f 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5560 principal evaluation fails
[4440 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5560 gate 1578074173486349700 evaluation fails
[4441 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4442 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4443 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4444 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4445 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4446 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4447 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5e60 gate 1578074173486800900 evaluation starts
[4448 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5e60 signed by 0 principal evaluation starts (used [false])
[4449 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5e60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[444a 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5e60 principal evaluation succeeds for identity 0
[444b 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd5e60 gate 1578074173486800900 evaluation succeeds
[444c 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[444d 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[444e 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[444f 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4450 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4451 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4452 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4453 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4454 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4455 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4456 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4457 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4458 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4459 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[445a 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[445b 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[445c 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[445d 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[445e 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[445f 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0e620 gate 1578074173488237900 evaluation starts
[4460 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0e620 signed by 0 principal evaluation starts (used [false])
[4461 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0e620 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4462 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0e620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4463 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0e620 principal evaluation fails
[4464 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0e620 gate 1578074173488237900 evaluation fails
[4465 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4466 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4467 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4468 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4469 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[446a 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[446b 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0ef20 gate 1578074173489060800 evaluation starts
[446c 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0ef20 signed by 0 principal evaluation starts (used [false])
[446d 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0ef20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[446e 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0ef20 principal evaluation succeeds for identity 0
[446f 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c0ef20 gate 1578074173489060800 evaluation succeeds
[4470 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4471 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4472 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4473 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4474 01-03 17:56:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4475 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4476 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4477 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4478 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4479 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[447a 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12283158077952541781 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[447b 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12283158077952541781 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[447c 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[447d 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12283158077952541781 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[447e 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12283158077952541781 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[447f 01-03 17:56:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4480 01-03 17:56:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[4481 01-03 17:56:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4482 01-03 17:56:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4483 01-03 17:56:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4484 01-03 17:56:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2924458828319881549 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4485 01-03 17:56:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2924458828319881549 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4486 01-03 17:56:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4487 01-03 17:56:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4488 01-03 17:56:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[4489 01-03 17:56:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[448a 01-03 17:56:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[448b 01-03 17:56:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[448c 01-03 17:56:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[448d 01-03 17:56:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[448e 01-03 17:56:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[448f 01-03 17:56:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[4490 01-03 17:56:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4491 01-03 17:56:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4492 01-03 17:56:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4493 01-03 17:56:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4494 01-03 17:56:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:9217890006244712605 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4495 01-03 17:56:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9217890006244712605 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4496 01-03 17:56:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4497 01-03 17:56:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4498 01-03 17:56:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:59 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[4499 01-03 17:56:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[449a 01-03 17:56:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:59 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[449b 01-03 17:56:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[449c 01-03 17:56:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 09 f9 e5 ce ea 95 93 1a 7f e9 dd 90 fd 02 c6 |................|
00000010 98 fe 4b 69 a1 ad 20 0c e6 68 94 a8 2a 09 f2 7b |..Ki.. ..h..*..{|
[449d 01-03 17:56:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e 9e bd 30 34 24 72 be 67 d1 22 68 |0D. n..04$r.g."h|
00000010 38 40 0d 17 15 3e eb 39 88 88 64 30 c0 6b 86 e1 |8@...>.9..d0.k..|
00000020 ba 2b 80 dd 02 20 2e f8 69 00 97 ea b3 16 a9 b5 |.+... ..i.......|
00000030 35 39 c2 5b c4 45 85 99 c8 a6 02 6f 9a 66 c4 95 |59.[.E.....o.f..|
00000040 5d b2 35 ff 58 21 |].5.X!|
[449e 01-03 17:56:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[449f 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 56 ba 24 d0 f1 ac 70 8a 8b f3 6a |0D. }V.$...p...j|
00000010 a3 bd ff 43 c3 fb f7 bb 3c d7 78 97 6d ca fe 6e |...C....<.x.m..n|
00000020 a7 63 18 0b 02 20 50 ef 8a 7e 12 f4 34 22 96 fc |.c... P..~..4"..|
00000030 6b 08 fa 59 82 d0 c5 3d 4c 05 29 05 7b 0c 01 12 |k..Y...=L.).{...|
00000040 cb b5 cf 99 47 c4 |....G.|
[44a0 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:59 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[44a1 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:59 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[44a2 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:59
[44a3 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:59
[44a4 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[44a5 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44a6 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44a7 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44a8 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[44a9 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44aa 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44ab 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers
[44ac 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[44ad 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[44ae 01-03 17:56:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44af 01-03 17:56:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[44b0 01-03 17:56:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[44b1 01-03 17:56:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510131801
[44b2 01-03 17:56:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8400B360486501B1B40B2ABEBE1A5347C63AC22A3A09D0900C48848D1F515550
[44b3 01-03 17:56:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[44b4 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44b5 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44b6 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44b7 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44b8 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:19 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[44b9 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44ba 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44bb 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:19 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[44bc 01-03 17:56:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44bd 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[44be 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44bf 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[44c0 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[44c1 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 0b 17 2d ae de a2 47 cd 28 ae 08 9b 5f c8 30 |l..-...G.(..._.0|
00000010 3c 8b 92 1d 85 ba 24 b4 58 27 d3 36 92 8d 27 1e |<.....$.X'.6..'.|
[44c2 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 44 db 30 97 05 66 0a ff 95 e9 b3 |0D. <D.0..f.....|
00000010 d0 b3 23 ea d7 d6 fb 3b 28 6b d1 09 6c 06 e3 c4 |..#....;(k..l...|
00000020 7a 46 cb 6e 02 20 3b c9 74 ef 50 6d da d5 c7 ea |zF.n. ;.t.Pm....|
00000030 e5 87 34 8d 09 eb b1 00 c2 be 7f c5 b0 57 33 c2 |..4..........W3.|
00000040 25 90 51 76 86 f8 |%.Qv..|
[44c3 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[44c4 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 6b de 16 ae 54 12 d3 f6 ec e2 52 |0D. uk...T.....R|
00000010 17 c5 fb 51 1d 8f fc 1f 47 ad 4f 50 d5 c4 f4 af |...Q....G.OP....|
00000020 0e cf c5 17 02 20 2e b7 33 60 fa 94 ac 43 b3 36 |..... ..3`...C.6|
00000030 82 52 33 0f fb 19 af 2b 92 f7 2d 0c fc 96 1d f9 |.R3....+..-.....|
00000040 5a 0e 1a e1 7b cf |Z...{.|
[44c5 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[44c6 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[44c7 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60
[44c8 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60
[44c9 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:59 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[44ca 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44cb 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44cc 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44cd 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[44ce 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[44cf 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44d0 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[44d1 01-03 17:56:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44d2 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[44d3 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[44d4 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44d5 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[44d6 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44d7 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44d8 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44d9 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44da 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[44db 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44dc 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[44dd 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[44de 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44df 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[44e0 01-03 17:56:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44e1 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5356918690149729040 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[44e2 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:5356918690149729040 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[44e3 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5356918690149729040 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[44e4 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44e5 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44e6 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44e7 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44e8 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44e9 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44ea 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[44eb 01-03 17:56:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44ec 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:7829060674562615688 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[44ed 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:7829060674562615688 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[44ee 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7829060674562615688 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[44ef 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44f0 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44f1 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44f2 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44f3 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44f4 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44f5 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[44f6 01-03 17:56:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44f7 01-03 17:56:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[44f8 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[44f9 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44fa 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[44fb 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[44fc 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44fd 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[44fe 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[44ff 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4500 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4501 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4502 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4503 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 6d f0 3c b5 cd b5 d9 24 09 aa 22 0a 79 f1 2b |2m.<....$..".y.+|
00000010 85 00 e3 de 7a 29 0c d8 4f 29 5f 78 7d 78 d2 d5 |....z)..O)_x}x..|
[4504 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 83 d0 09 3b c5 90 e1 54 56 3e |0E.!.....;...TV>|
00000010 7c e3 9c b7 94 5b de e3 7e de 7c 4d 45 99 05 4c ||....[..~.|ME..L|
00000020 c0 13 81 ae 4c 02 20 7d bb dc 01 cb 46 7f 81 28 |....L. }....F..(|
00000030 9b 33 45 8d 6a 4c 80 5b 10 5f 7f 0f 73 d5 f0 49 |.3E.jL.[._..s..I|
00000040 19 b1 dd a5 7a d1 c1 |....z..|
[4505 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4506 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cab170 gate 1578074177120696500 evaluation starts
[4507 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cab170 signed by 0 principal evaluation starts (used [false])
[4508 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cab170 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4509 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cab170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[450a 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cab170 principal evaluation fails
[450b 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cab170 gate 1578074177120696500 evaluation fails
[450c 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[450d 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[450e 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[450f 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 6d f0 3c b5 cd b5 d9 24 09 aa 22 0a 79 f1 2b |2m.<....$..".y.+|
00000010 85 00 e3 de 7a 29 0c d8 4f 29 5f 78 7d 78 d2 d5 |....z)..O)_x}x..|
[4510 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 83 d0 09 3b c5 90 e1 54 56 3e |0E.!.....;...TV>|
00000010 7c e3 9c b7 94 5b de e3 7e de 7c 4d 45 99 05 4c ||....[..~.|ME..L|
00000020 c0 13 81 ae 4c 02 20 7d bb dc 01 cb 46 7f 81 28 |....L. }....F..(|
00000030 9b 33 45 8d 6a 4c 80 5b 10 5f 7f 0f 73 d5 f0 49 |.3E.jL.[._..s..I|
00000040 19 b1 dd a5 7a d1 c1 |....z..|
[4511 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4512 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caba70 gate 1578074177121147900 evaluation starts
[4513 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caba70 signed by 0 principal evaluation starts (used [false])
[4514 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caba70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4515 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caba70 principal evaluation succeeds for identity 0
[4516 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caba70 gate 1578074177121147900 evaluation succeeds
[4517 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4518 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4519 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[451a 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[451b 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[451c 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes]}
[451d 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59
[451e 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59
[451f 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4520 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4521 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4522 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4523 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[4524 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4525 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4526 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4527 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[4528 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4529 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[452a 01-03 17:56:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[452b 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[452c 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[452d 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[452e 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[452f 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4530 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4531 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4532 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4533 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4534 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4535 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4536 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4537 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 82 5a 49 90 09 a4 d9 ad b6 d3 30 91 4f 87 c9 |..ZI.......0.O..|
00000010 34 3d c1 85 5c 48 4b 40 6d d1 93 83 43 9f fd 3a |4=..\HK@m...C..:|
[4538 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 3d 5b c3 6d 81 2e 38 99 90 dc be |0D. *=[.m..8....|
00000010 ca ce 18 62 7f b8 78 0b a2 54 9f b2 af 82 b6 09 |...b..x..T......|
00000020 9b a6 55 2e 02 20 07 bb 32 ed a4 d1 6a b2 12 c8 |..U.. ..2...j...|
00000030 9e a5 23 08 69 b2 a9 75 5a bc 42 88 bd 1c 17 7e |..#.i..uZ.B....~|
00000040 1f 4c 95 63 68 01 |.L.ch.|
[4539 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[453a 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9210 gate 1578074177156643100 evaluation starts
[453b 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9210 signed by 0 principal evaluation starts (used [false])
[453c 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9210 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[453d 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[453e 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9210 principal evaluation fails
[453f 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9210 gate 1578074177156643100 evaluation fails
[4540 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4541 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4542 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4543 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 82 5a 49 90 09 a4 d9 ad b6 d3 30 91 4f 87 c9 |..ZI.......0.O..|
00000010 34 3d c1 85 5c 48 4b 40 6d d1 93 83 43 9f fd 3a |4=..\HK@m...C..:|
[4544 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 3d 5b c3 6d 81 2e 38 99 90 dc be |0D. *=[.m..8....|
00000010 ca ce 18 62 7f b8 78 0b a2 54 9f b2 af 82 b6 09 |...b..x..T......|
00000020 9b a6 55 2e 02 20 07 bb 32 ed a4 d1 6a b2 12 c8 |..U.. ..2...j...|
00000030 9e a5 23 08 69 b2 a9 75 5a bc 42 88 bd 1c 17 7e |..#.i..uZ.B....~|
00000040 1f 4c 95 63 68 01 |.L.ch.|
[4545 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4546 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9b10 gate 1578074177157154200 evaluation starts
[4547 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9b10 signed by 0 principal evaluation starts (used [false])
[4548 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9b10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4549 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9b10 principal evaluation succeeds for identity 0
[454a 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cd9b10 gate 1578074177157154200 evaluation succeeds
[454b 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[454c 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[454d 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[454e 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[454f 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[4550 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes]}
[4551 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57
[4552 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57
[4553 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4554 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4555 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4556 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4557 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[4558 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4559 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[455a 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[455b 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[455c 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[455d 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[455e 01-03 17:56:17.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[455f 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4560 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9323908061707101602 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4561 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[4562 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5797358197406074310 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4563 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[4564 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8431743465174884429 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4565 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9323908061707101602 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4566 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4567 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8431743465174884429 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4568 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4569 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5797358197406074310 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[456a 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8431743465174884429 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[456b 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8431743465174884429 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[456c 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[456d 01-03 17:56:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[456e 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9323908061707101602 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[456f 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9323908061707101602 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[4570 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9323908061707101602 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[4571 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4572 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5797358197406074310 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4573 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5797358197406074310 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4574 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5797358197406074310 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4575 01-03 17:56:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4576 01-03 17:56:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151038
[4577 01-03 17:56:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 21FA8E6767D9492DDDC02FFDD3B517207116C3A21E1F23EFCED608AD2CC65D26
[4578 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4579 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[457a 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[457b 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[457c 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[457d 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[457e 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[457f 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4580 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4581 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4582 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4583 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4584 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4585 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[4586 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4587 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[4588 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4589 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 fa 8e 67 67 d9 49 2d dd c0 2f fd d3 b5 17 20 |!..gg.I-../.... |
00000010 71 16 c3 a2 1e 1f 23 ef ce d6 08 ad 2c c6 5d 26 |q.....#.....,.]&|
[458a 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 74 af 87 3b c1 04 7a 5f 69 8e |0E.!..t..;..z_i.|
00000010 21 94 6f e6 3d 01 63 20 58 3c dd 56 23 fa f7 f6 |!.o.=.c X<.V#...|
00000020 f1 d8 52 e1 c4 02 20 64 23 a2 09 10 dc 60 37 86 |..R... d#....`7.|
00000030 45 8f 13 ed 18 af 93 af 12 31 79 56 83 34 df c2 |E........1yV.4..|
00000040 10 21 63 07 80 2b 54 |.!c..+T|
[458b 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[458c 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 70 c7 a9 79 f9 8f df 9d d3 6f b1 |0D. >p..y.....o.|
00000010 fd ce 70 c5 0f d9 63 3a c4 e1 ec 30 1a 24 3a 93 |..p...c:...0.$:.|
00000020 e9 f6 9b 66 02 20 5d d4 29 d5 66 22 cc d6 86 53 |...f. ].).f"...S|
00000030 86 ca db 35 3d 14 cc 3e c7 36 96 32 98 af 97 86 |...5=..>.6.2....|
00000040 a5 ea e8 49 5f a9 |...I_.|
[458d 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[458e 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[458f 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4590 01-03 17:56:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4591 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4592 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4593 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4594 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4595 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4596 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4597 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4598 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4599 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[459a 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[459b 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[459c 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[459d 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 82 5a 49 90 09 a4 d9 ad b6 d3 30 91 4f 87 c9 |..ZI.......0.O..|
00000010 34 3d c1 85 5c 48 4b 40 6d d1 93 83 43 9f fd 3a |4=..\HK@m...C..:|
[459e 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 3d 5b c3 6d 81 2e 38 99 90 dc be |0D. *=[.m..8....|
00000010 ca ce 18 62 7f b8 78 0b a2 54 9f b2 af 82 b6 09 |...b..x..T......|
00000020 9b a6 55 2e 02 20 07 bb 32 ed a4 d1 6a b2 12 c8 |..U.. ..2...j...|
00000030 9e a5 23 08 69 b2 a9 75 5a bc 42 88 bd 1c 17 7e |..#.i..uZ.B....~|
00000040 1f 4c 95 63 68 01 |.L.ch.|
[459f 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[45a0 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d368a0 gate 1578074177322529900 evaluation starts
[45a1 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d368a0 signed by 0 principal evaluation starts (used [false])
[45a2 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d368a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[45a3 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d368a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[45a4 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d368a0 principal evaluation fails
[45a5 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d368a0 gate 1578074177322529900 evaluation fails
[45a6 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[45a7 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[45a8 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[45a9 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 82 5a 49 90 09 a4 d9 ad b6 d3 30 91 4f 87 c9 |..ZI.......0.O..|
00000010 34 3d c1 85 5c 48 4b 40 6d d1 93 83 43 9f fd 3a |4=..\HK@m...C..:|
[45aa 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 3d 5b c3 6d 81 2e 38 99 90 dc be |0D. *=[.m..8....|
00000010 ca ce 18 62 7f b8 78 0b a2 54 9f b2 af 82 b6 09 |...b..x..T......|
00000020 9b a6 55 2e 02 20 07 bb 32 ed a4 d1 6a b2 12 c8 |..U.. ..2...j...|
00000030 9e a5 23 08 69 b2 a9 75 5a bc 42 88 bd 1c 17 7e |..#.i..uZ.B....~|
00000040 1f 4c 95 63 68 01 |.L.ch.|
[45ab 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[45ac 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d371a0 gate 1578074177323163800 evaluation starts
[45ad 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d371a0 signed by 0 principal evaluation starts (used [false])
[45ae 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d371a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[45af 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d371a0 principal evaluation succeeds for identity 0
[45b0 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d371a0 gate 1578074177323163800 evaluation succeeds
[45b1 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[45b2 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[45b3 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[45b4 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[45b5 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[45b6 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45b7 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[45b8 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 fa 8e 67 67 d9 49 2d dd c0 2f fd d3 b5 17 20 |!..gg.I-../.... |
00000010 71 16 c3 a2 1e 1f 23 ef ce d6 08 ad 2c c6 5d 26 |q.....#.....,.]&|
[45b9 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 74 af 87 3b c1 04 7a 5f 69 8e |0E.!..t..;..z_i.|
00000010 21 94 6f e6 3d 01 63 20 58 3c dd 56 23 fa f7 f6 |!.o.=.c X<.V#...|
00000020 f1 d8 52 e1 c4 02 20 64 23 a2 09 10 dc 60 37 86 |..R... d#....`7.|
00000030 45 8f 13 ed 18 af 93 af 12 31 79 56 83 34 df c2 |E........1yV.4..|
00000040 10 21 63 07 80 2b 54 |.!c..+T|
[45ba 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[45bb 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[45bc 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45bd 01-03 17:56:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45be 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[45bf 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[45c0 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45c1 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[45c2 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[45c3 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45c4 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[45c5 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[45c6 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[45c7 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[45c8 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[45c9 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[45ca 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 6d f0 3c b5 cd b5 d9 24 09 aa 22 0a 79 f1 2b |2m.<....$..".y.+|
00000010 85 00 e3 de 7a 29 0c d8 4f 29 5f 78 7d 78 d2 d5 |....z)..O)_x}x..|
[45cb 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 83 d0 09 3b c5 90 e1 54 56 3e |0E.!.....;...TV>|
00000010 7c e3 9c b7 94 5b de e3 7e de 7c 4d 45 99 05 4c ||....[..~.|ME..L|
00000020 c0 13 81 ae 4c 02 20 7d bb dc 01 cb 46 7f 81 28 |....L. }....F..(|
00000030 9b 33 45 8d 6a 4c 80 5b 10 5f 7f 0f 73 d5 f0 49 |.3E.jL.[._..s..I|
00000040 19 b1 dd a5 7a d1 c1 |....z..|
[45cc 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[45cd 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d4bd80 gate 1578074177336785900 evaluation starts
[45ce 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d4bd80 signed by 0 principal evaluation starts (used [false])
[45cf 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d4bd80 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[45d0 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d4bd80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[45d1 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d4bd80 principal evaluation fails
[45d2 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d4bd80 gate 1578074177336785900 evaluation fails
[45d3 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[45d4 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[45d5 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[45d6 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 6d f0 3c b5 cd b5 d9 24 09 aa 22 0a 79 f1 2b |2m.<....$..".y.+|
00000010 85 00 e3 de 7a 29 0c d8 4f 29 5f 78 7d 78 d2 d5 |....z)..O)_x}x..|
[45d7 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 83 d0 09 3b c5 90 e1 54 56 3e |0E.!.....;...TV>|
00000010 7c e3 9c b7 94 5b de e3 7e de 7c 4d 45 99 05 4c ||....[..~.|ME..L|
00000020 c0 13 81 ae 4c 02 20 7d bb dc 01 cb 46 7f 81 28 |....L. }....F..(|
00000030 9b 33 45 8d 6a 4c 80 5b 10 5f 7f 0f 73 d5 f0 49 |.3E.jL.[._..s..I|
00000040 19 b1 dd a5 7a d1 c1 |....z..|
[45d8 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[45d9 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d5a680 gate 1578074177337311900 evaluation starts
[45da 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d5a680 signed by 0 principal evaluation starts (used [false])
[45db 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d5a680 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[45dc 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d5a680 principal evaluation succeeds for identity 0
[45dd 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d5a680 gate 1578074177337311900 evaluation succeeds
[45de 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[45df 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[45e0 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[45e1 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[45e2 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[45e3 01-03 17:56:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45e4 01-03 17:56:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[45e5 01-03 17:56:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 fa 8e 67 67 d9 49 2d dd c0 2f fd d3 b5 17 20 |!..gg.I-../.... |
00000010 71 16 c3 a2 1e 1f 23 ef ce d6 08 ad 2c c6 5d 26 |q.....#.....,.]&|
[45e6 01-03 17:56:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 74 af 87 3b c1 04 7a 5f 69 8e |0E.!..t..;..z_i.|
00000010 21 94 6f e6 3d 01 63 20 58 3c dd 56 23 fa f7 f6 |!.o.=.c X<.V#...|
00000020 f1 d8 52 e1 c4 02 20 64 23 a2 09 10 dc 60 37 86 |..R... d#....`7.|
00000030 45 8f 13 ed 18 af 93 af 12 31 79 56 83 34 df c2 |E........1yV.4..|
00000040 10 21 63 07 80 2b 54 |.!c..+T|
[45e7 01-03 17:56:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[45e8 01-03 17:56:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[45e9 01-03 17:56:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45ea 01-03 17:56:17.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45eb 01-03 17:56:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45ec 01-03 17:56:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45ed 01-03 17:56:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[45ee 01-03 17:56:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[45ef 01-03 17:56:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45f0 01-03 17:56:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[45f1 01-03 17:56:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45f2 01-03 17:56:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[45f3 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[45f4 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[45f5 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45f6 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45f7 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45f8 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[45f9 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[45fa 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[45fb 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[45fc 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[45fd 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[45fe 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[45ff 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4600 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4601 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d787c0 gate 1578074177465987100 evaluation starts
[4602 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d787c0 signed by 0 principal evaluation starts (used [false])
[4603 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d787c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4604 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d787c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4605 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d787c0 principal evaluation fails
[4606 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d787c0 gate 1578074177465987100 evaluation fails
[4607 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4608 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4609 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[460a 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[460b 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[460c 01-03 17:56:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[460d 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d790c0 gate 1578074177470089000 evaluation starts
[460e 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d790c0 signed by 0 principal evaluation starts (used [false])
[460f 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d790c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4610 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d790c0 principal evaluation succeeds for identity 0
[4611 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d790c0 gate 1578074177470089000 evaluation succeeds
[4612 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4613 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4614 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4615 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4616 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4617 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4618 01-03 17:56:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4619 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[461a 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[461b 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[461c 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[461d 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[461e 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[461f 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4620 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4621 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4622 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4623 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4624 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4625 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4626 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4627 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d93880 gate 1578074177487068000 evaluation starts
[4628 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d93880 signed by 0 principal evaluation starts (used [false])
[4629 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d93880 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[462a 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d93880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[462b 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d93880 principal evaluation fails
[462c 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d93880 gate 1578074177487068000 evaluation fails
[462d 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[462e 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[462f 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4630 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4631 01-03 17:56:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4632 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4633 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db0180 gate 1578074177491079400 evaluation starts
[4634 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db0180 signed by 0 principal evaluation starts (used [false])
[4635 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db0180 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4636 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db0180 principal evaluation succeeds for identity 0
[4637 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db0180 gate 1578074177491079400 evaluation succeeds
[4638 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4639 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[463a 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[463b 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[463c 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[463d 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[463e 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[463f 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4640 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4641 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4642 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4643 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4644 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4645 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4646 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4647 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4648 01-03 17:56:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4649 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[464a 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db1e90 gate 1578074177501110200 evaluation starts
[464b 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db1e90 signed by 0 principal evaluation starts (used [false])
[464c 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db1e90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[464d 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db1e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[464e 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db1e90 principal evaluation fails
[464f 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008db1e90 gate 1578074177501110200 evaluation fails
[4650 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4651 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4652 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4653 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4654 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4655 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4656 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dcc790 gate 1578074177504275400 evaluation starts
[4657 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dcc790 signed by 0 principal evaluation starts (used [false])
[4658 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dcc790 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4659 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dcc790 principal evaluation succeeds for identity 0
[465a 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dcc790 gate 1578074177504275400 evaluation succeeds
[465b 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[465c 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[465d 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[465e 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[465f 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4660 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4661 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4662 01-03 17:56:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4663 01-03 17:56:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4664 01-03 17:56:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4665 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4666 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4667 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4668 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4669 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[466a 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[466b 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[466c 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dde8a0 gate 1578074177530913500 evaluation starts
[466d 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dde8a0 signed by 0 principal evaluation starts (used [false])
[466e 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dde8a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[466f 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dde8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4670 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dde8a0 principal evaluation fails
[4671 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008dde8a0 gate 1578074177530913500 evaluation fails
[4672 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4673 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4674 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4675 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4676 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4677 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4678 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ddf1a0 gate 1578074177531899800 evaluation starts
[4679 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ddf1a0 signed by 0 principal evaluation starts (used [false])
[467a 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ddf1a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[467b 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ddf1a0 principal evaluation succeeds for identity 0
[467c 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ddf1a0 gate 1578074177531899800 evaluation succeeds
[467d 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[467e 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[467f 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4680 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4681 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4682 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4683 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4684 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4685 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4686 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4687 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4688 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4689 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[468a 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[468b 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[468c 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[468d 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[468e 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[468f 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4690 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4691 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4692 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4693 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4694 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e141f0 gate 1578074177539469900 evaluation starts
[4695 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e141f0 signed by 0 principal evaluation starts (used [false])
[4696 01-03 17:56:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e141f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4697 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e141f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4698 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e141f0 principal evaluation fails
[4699 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e141f0 gate 1578074177539469900 evaluation fails
[469a 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[469b 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[469c 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[469d 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[469e 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[469f 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46a0 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e14af0 gate 1578074177544040100 evaluation starts
[46a1 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e14af0 signed by 0 principal evaluation starts (used [false])
[46a2 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e14af0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[46a3 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e14af0 principal evaluation succeeds for identity 0
[46a4 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e14af0 gate 1578074177544040100 evaluation succeeds
[46a5 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[46a6 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[46a7 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[46a8 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[46a9 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46aa 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46ab 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[46ac 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[46ad 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[46ae 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[46af 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[46b0 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[46b1 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[46b2 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[46b3 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46b4 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2a550 gate 1578074177545613700 evaluation starts
[46b5 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2a550 signed by 0 principal evaluation starts (used [false])
[46b6 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2a550 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[46b7 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2a550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[46b8 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2a550 principal evaluation fails
[46b9 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2a550 gate 1578074177545613700 evaluation fails
[46ba 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[46bb 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[46bc 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[46bd 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[46be 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[46bf 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46c0 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2ae50 gate 1578074177546207700 evaluation starts
[46c1 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2ae50 signed by 0 principal evaluation starts (used [false])
[46c2 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2ae50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[46c3 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2ae50 principal evaluation succeeds for identity 0
[46c5 01-03 17:56:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2ae50 gate 1578074177546207700 evaluation succeeds
[46c6 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[46c7 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[46c8 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[46c9 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[46ca 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[46c4 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46cb 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46cc 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[46cd 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46ce 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46cf 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2655101180071396916 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[46d0 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2655101180071396916 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[46d1 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[46d2 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2655101180071396916 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[46d3 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2655101180071396916 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[46d4 01-03 17:56:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[46d5 01-03 17:56:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[46d6 01-03 17:56:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46d7 01-03 17:56:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46d8 01-03 17:56:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[46d9 01-03 17:56:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9613221814309794490 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[46da 01-03 17:56:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9613221814309794490 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[46db 01-03 17:56:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[46dc 01-03 17:56:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[46dd 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[46de 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[46df 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[46e0 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[46e1 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[46e2 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46e3 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[46e4 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[46e5 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[46e6 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[46e7 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[46e8 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[46e9 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 c4 ec fb 34 34 af 0a f5 90 50 5a b6 ba 70 32 |s...44....PZ..p2|
00000010 b8 25 ba 7a 9d 78 6d 75 d8 93 ed 45 04 1d ae 8d |.%.z.xmu...E....|
[46ea 01-03 17:56:18.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee da 8c d7 5e 57 5c 4b a8 ec a5 |0E.!.....^W\K...|
00000010 6a 5b 1b 9d 6f 2f db 7c 35 ed 72 6b 30 28 47 d6 |j[..o/.|5.rk0(G.|
00000020 54 1a 2a 7f a0 02 20 6a 80 ea cb 71 f6 1f 60 3b |T.*... j...q..`;|
00000030 a7 ed 01 5d 1c 6d 56 2e a6 66 d1 8a 25 50 b8 79 |...].mV..f..%P.y|
00000040 47 4d 04 b5 8b 2d cd |GM...-.|
[46eb 01-03 17:56:18.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46ec 01-03 17:56:18.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59220 gate 1578074178038985000 evaluation starts
[46ed 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59220 signed by 0 principal evaluation starts (used [false])
[46ee 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59220 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[46ef 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[46f0 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59220 principal evaluation fails
[46f1 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59220 gate 1578074178038985000 evaluation fails
[46f2 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[46f3 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[46f4 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[46f5 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 c4 ec fb 34 34 af 0a f5 90 50 5a b6 ba 70 32 |s...44....PZ..p2|
00000010 b8 25 ba 7a 9d 78 6d 75 d8 93 ed 45 04 1d ae 8d |.%.z.xmu...E....|
[46f6 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee da 8c d7 5e 57 5c 4b a8 ec a5 |0E.!.....^W\K...|
00000010 6a 5b 1b 9d 6f 2f db 7c 35 ed 72 6b 30 28 47 d6 |j[..o/.|5.rk0(G.|
00000020 54 1a 2a 7f a0 02 20 6a 80 ea cb 71 f6 1f 60 3b |T.*... j...q..`;|
00000030 a7 ed 01 5d 1c 6d 56 2e a6 66 d1 8a 25 50 b8 79 |...].mV..f..%P.y|
00000040 47 4d 04 b5 8b 2d cd |GM...-.|
[46f7 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46f8 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59b20 gate 1578074178040962000 evaluation starts
[46f9 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59b20 signed by 0 principal evaluation starts (used [false])
[46fa 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59b20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[46fb 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59b20 principal evaluation succeeds for identity 0
[46fc 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e59b20 gate 1578074178040962000 evaluation succeeds
[46fd 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[46fe 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[46ff 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4700 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4701 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4702 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4703 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4704 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes]}
[4705 01-03 17:56:18.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58
[4706 01-03 17:56:18.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58
[4707 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4708 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4709 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[470a 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[470b 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[470c 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[470d 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[470e 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[470f 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4710 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4711 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4712 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4713 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4714 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4715 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4716 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4717 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4718 01-03 17:56:18.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4719 01-03 17:56:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[471a 01-03 17:56:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[471b 01-03 17:56:18.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[471c 01-03 17:56:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[471d 01-03 17:56:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[471e 01-03 17:56:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4720 01-03 17:56:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[471f 01-03 17:56:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4721 01-03 17:56:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4722 01-03 17:56:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4723 01-03 17:56:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4724 01-03 17:56:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4725 01-03 17:56:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4726 01-03 17:56:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4727 01-03 17:56:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4728 01-03 17:56:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4729 01-03 17:56:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[472a 01-03 17:56:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[472c 01-03 17:56:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[472d 01-03 17:56:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[472e 01-03 17:56:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[472b 01-03 17:56:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 ce 1b 3f 3b fb 6f 6b 15 74 bb fe 8f 2a 72 d7 |...?;.ok.t...*r.|
00000010 e4 b8 67 0a b7 2a d0 96 09 dc c5 0d 38 4b 10 97 |..g..*......8K..|
[472f 01-03 17:56:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 b8 5b 8b 7d 7d 0e 64 be e3 8c b1 |0D. S.[.}}.d....|
00000010 d8 77 a1 3b 0e 58 11 69 3f b7 36 30 30 f4 63 40 |.w.;.X.i?.600.c@|
00000020 b5 09 25 99 02 20 56 5c df bf c0 53 5a de a5 8d |..%.. V\...SZ...|
00000030 a3 9c b6 f4 7b e3 90 9f 9b 8b 33 99 96 9f af ab |....{.....3.....|
00000040 db 58 69 2e db 9a |.Xi...|
[4730 01-03 17:56:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4731 01-03 17:56:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e85970 gate 1578074178139599100 evaluation starts
[4732 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e85970 signed by 0 principal evaluation starts (used [false])
[4733 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e85970 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4734 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e85970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4735 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e85970 principal evaluation fails
[4736 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e85970 gate 1578074178139599100 evaluation fails
[4737 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4738 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4739 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[473a 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 ce 1b 3f 3b fb 6f 6b 15 74 bb fe 8f 2a 72 d7 |...?;.ok.t...*r.|
00000010 e4 b8 67 0a b7 2a d0 96 09 dc c5 0d 38 4b 10 97 |..g..*......8K..|
[473b 01-03 17:56:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 b8 5b 8b 7d 7d 0e 64 be e3 8c b1 |0D. S.[.}}.d....|
00000010 d8 77 a1 3b 0e 58 11 69 3f b7 36 30 30 f4 63 40 |.w.;.X.i?.600.c@|
00000020 b5 09 25 99 02 20 56 5c df bf c0 53 5a de a5 8d |..%.. V\...SZ...|
00000030 a3 9c b6 f4 7b e3 90 9f 9b 8b 33 99 96 9f af ab |....{.....3.....|
00000040 db 58 69 2e db 9a |.Xi...|
[473c 01-03 17:56:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[473d 01-03 17:56:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea2270 gate 1578074178150460300 evaluation starts
[473e 01-03 17:56:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea2270 signed by 0 principal evaluation starts (used [false])
[473f 01-03 17:56:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea2270 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4740 01-03 17:56:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea2270 principal evaluation succeeds for identity 0
[4742 01-03 17:56:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea2270 gate 1578074178150460300 evaluation succeeds
[4743 01-03 17:56:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4744 01-03 17:56:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4745 01-03 17:56:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4741 01-03 17:56:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[4746 01-03 17:56:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4747 01-03 17:56:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4748 01-03 17:56:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes]}
[4749 01-03 17:56:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60
[474a 01-03 17:56:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60
[474b 01-03 17:56:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[474c 01-03 17:56:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[474d 01-03 17:56:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[474e 01-03 17:56:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[474f 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4750 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4751 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4752 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4753 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4754 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4755 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4756 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4757 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4758 01-03 17:56:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[475a 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[475b 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[475c 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[475d 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[475e 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[475f 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4759 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4760 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4761 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4762 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4763 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4764 01-03 17:56:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[4765 01-03 17:56:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4766 01-03 17:56:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4767 01-03 17:56:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4768 01-03 17:56:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4769 01-03 17:56:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151039
[476a 01-03 17:56:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DF44FF7F5E05E0366EA5B1DDC70D74EB12D2DBD0B146892FD24943866D060EF1
[476b 01-03 17:56:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[476c 01-03 17:56:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[476d 01-03 17:56:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[476e 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[476f 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4770 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4771 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4772 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[4773 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[4774 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4775 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4776 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4777 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4778 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4779 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[477a 01-03 17:56:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[477b 01-03 17:56:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[477c 01-03 17:56:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[477d 01-03 17:56:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[477e 01-03 17:56:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[477f 01-03 17:56:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4780 01-03 17:56:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4781 01-03 17:56:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:5870918419095571506 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4782 01-03 17:56:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5870918419095571506 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4783 01-03 17:56:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4784 01-03 17:56:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4785 01-03 17:56:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[4786 01-03 17:56:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4787 01-03 17:56:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[4788 01-03 17:56:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4789 01-03 17:56:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f ae ce d6 5c c5 d4 02 4f 9a 2b 89 29 2d fa 57 |....\...O.+.)-.W|
00000010 8b aa 9c 65 18 36 4a 2b 68 20 8e 30 05 bb c5 f2 |...e.6J+h .0....|
[478a 01-03 17:56:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 f8 8e 76 4c 84 89 1e 9c 67 44 |0E.!....vL....gD|
00000010 90 b7 7f a8 dc ed 74 91 b9 bc a9 54 d3 e1 6e 67 |......t....T..ng|
00000020 c3 6e 69 9a 33 02 20 52 0c ba 83 5e b0 10 e5 71 |.ni.3. R...^...q|
00000030 4e 10 f2 8b 47 ce 4c ec 16 ff 83 88 d4 dc e2 b3 |N...G.L.........|
00000040 3d f3 d7 b6 fb 13 3d |=.....=|
[478b 01-03 17:56:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[478c 01-03 17:56:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 76 b8 0c 23 10 48 16 ab 30 8a |0E.!..v..#.H..0.|
00000010 82 03 86 b2 76 cd a7 c8 81 4c fb 41 eb 76 e6 ad |....v....L.A.v..|
00000020 84 54 13 55 23 02 20 61 53 20 f7 49 68 3a d5 15 |.T.U#. aS .Ih:..|
00000030 2e 56 6d 20 d8 36 71 da e7 0f ca 83 26 00 9c a6 |.Vm .6q.....&...|
00000040 df 96 68 73 2c 4f 8e |..hs,O.|
[478d 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[478e 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[478f 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61
[4790 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61
[4791 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4792 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4793 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4794 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4795 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4796 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4797 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers
[4798 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[4799 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[479a 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[479b 01-03 17:56:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[479c 01-03 17:56:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:9696910672077244799 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[479d 01-03 17:56:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:9696910672077244799 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[479e 01-03 17:56:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9696910672077244799 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[479f 01-03 17:56:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a0 01-03 17:56:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a1 01-03 17:56:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a2 01-03 17:56:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a3 01-03 17:56:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13457899718155733977 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[47a4 01-03 17:56:21.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[47a5 01-03 17:56:21.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[47a6 01-03 17:56:21.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a7 01-03 17:56:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a8 01-03 17:56:21.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[47a9 01-03 17:56:21.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47aa 01-03 17:56:21.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:13457899718155733977 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[47ab 01-03 17:56:21.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13457899718155733977 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[47ac 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47ad 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47ae 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47af 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b0 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b1 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b2 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[47b3 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47b4 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[47b5 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47b6 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[47b7 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[47b8 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[47b9 01-03 17:56:21.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47ba 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[47bb 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[47bc 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[47bd 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[47be 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[47bf 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[47c0 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 20 46 c1 b6 fb 80 fa 52 36 5a 00 18 56 3b fe |. F.....R6Z..V;.|
00000010 64 42 08 5c 2d c5 66 6e a4 35 00 a1 e0 8a 04 27 |dB.\-.fn.5.....'|
[47c1 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c bd 06 3a 85 5d c9 8c 79 1a 46 e9 |0D. l..:.]..y.F.|
00000010 29 81 7f 33 bb ee 73 82 20 4f 10 74 65 1f 26 50 |)..3..s. O.te.&P|
00000020 1c 82 03 be 02 20 09 4b 56 36 9d a8 11 7c bc da |..... .KV6...|..|
00000030 ab d5 28 32 b8 1a f7 68 56 ce ba 7c 10 60 6b e7 |..(2...hV..|.`k.|
00000040 8e 2c 5b d0 7d 9a |.,[.}.|
[47c2 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[47c3 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2ae50 gate 1578074181185400800 evaluation starts
[47c4 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2ae50 signed by 0 principal evaluation starts (used [false])
[47c5 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2ae50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[47c6 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2ae50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[47c7 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2ae50 principal evaluation fails
[47c8 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2ae50 gate 1578074181185400800 evaluation fails
[47c9 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[47ca 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[47cb 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[47cc 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 20 46 c1 b6 fb 80 fa 52 36 5a 00 18 56 3b fe |. F.....R6Z..V;.|
00000010 64 42 08 5c 2d c5 66 6e a4 35 00 a1 e0 8a 04 27 |dB.\-.fn.5.....'|
[47cd 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c bd 06 3a 85 5d c9 8c 79 1a 46 e9 |0D. l..:.]..y.F.|
00000010 29 81 7f 33 bb ee 73 82 20 4f 10 74 65 1f 26 50 |)..3..s. O.te.&P|
00000020 1c 82 03 be 02 20 09 4b 56 36 9d a8 11 7c bc da |..... .KV6...|..|
00000030 ab d5 28 32 b8 1a f7 68 56 ce ba 7c 10 60 6b e7 |..(2...hV..|.`k.|
00000040 8e 2c 5b d0 7d 9a |.,[.}.|
[47ce 01-03 17:56:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[47cf 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2b750 gate 1578074181194992000 evaluation starts
[47d0 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2b750 signed by 0 principal evaluation starts (used [false])
[47d1 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2b750 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[47d2 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2b750 principal evaluation succeeds for identity 0
[47d3 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f2b750 gate 1578074181194992000 evaluation succeeds
[47d4 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[47d5 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[47d6 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[47d7 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[47d8 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[47d9 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes]}
[47da 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61
[47db 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61
[47dc 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[47dd 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47de 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47df 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47e0 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[47e1 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[47e2 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47e3 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47e4 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47e5 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[47e6 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[47e7 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[47e8 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47e9 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[47eb 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47ea 01-03 17:56:21.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47ec 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[47ed 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[47ee 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[47ef 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[47f0 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[47f1 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[47f2 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 ef 4a 01 6f 8d c2 b8 ab 54 a3 dd c1 eb cf e2 |..J.o....T......|
00000010 e2 93 b4 aa 02 a1 e8 bf 1a 45 be 74 93 55 10 53 |.........E.t.U.S|
[47f3 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 96 36 91 56 76 0e 51 6a 31 bf |0E.!...6.Vv.Qj1.|
00000010 e5 e2 a1 36 28 1a ea e5 e8 f4 2d c0 ea d1 5e 08 |...6(.....-...^.|
00000020 ae e7 dc 29 48 02 20 2c d0 6e 04 b9 69 d1 97 2d |...)H. ,.n..i..-|
00000030 0a 2c 5e 1e 01 78 d3 0f cd 6e 70 07 a1 86 9f 56 |.,^..x...np....V|
00000040 89 66 a6 bf 2c d1 ee |.f..,..|
[47f4 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[47f5 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f3bb20 gate 1578074181204592700 evaluation starts
[47f6 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f3bb20 signed by 0 principal evaluation starts (used [false])
[47f7 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f3bb20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[47f8 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f3bb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[47f9 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f3bb20 principal evaluation fails
[47fa 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f3bb20 gate 1578074181204592700 evaluation fails
[47fc 01-03 17:56:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[47fd 01-03 17:56:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15900232485097345037 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[47fe 01-03 17:56:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[47ff 01-03 17:56:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5192336599353427767 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4800 01-03 17:56:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4801 01-03 17:56:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14227796457737582485 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4802 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14227796457737582485 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4803 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4804 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15900232485097345037 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4805 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4806 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5192336599353427767 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4807 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47fb 01-03 17:56:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4808 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4809 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[480a 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 ef 4a 01 6f 8d c2 b8 ab 54 a3 dd c1 eb cf e2 |..J.o....T......|
00000010 e2 93 b4 aa 02 a1 e8 bf 1a 45 be 74 93 55 10 53 |.........E.t.U.S|
[480b 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 96 36 91 56 76 0e 51 6a 31 bf |0E.!...6.Vv.Qj1.|
00000010 e5 e2 a1 36 28 1a ea e5 e8 f4 2d c0 ea d1 5e 08 |...6(.....-...^.|
00000020 ae e7 dc 29 48 02 20 2c d0 6e 04 b9 69 d1 97 2d |...)H. ,.n..i..-|
00000030 0a 2c 5e 1e 01 78 d3 0f cd 6e 70 07 a1 86 9f 56 |.,^..x...np....V|
00000040 89 66 a6 bf 2c d1 ee |.f..,..|
[480c 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[480d 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f54420 gate 1578074181244552300 evaluation starts
[480e 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f54420 signed by 0 principal evaluation starts (used [false])
[480f 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f54420 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4810 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f54420 principal evaluation succeeds for identity 0
[4811 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f54420 gate 1578074181244552300 evaluation succeeds
[4812 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4813 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4814 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4815 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4816 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[4817 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes]}
[4818 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59
[4819 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59
[481a 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[481b 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[481c 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[481d 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[481e 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[481f 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4820 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4821 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4822 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[4823 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4824 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4825 01-03 17:56:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4826 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5192336599353427767 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[4827 01-03 17:56:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15900232485097345037 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[4828 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5192336599353427767 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[4829 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[482b 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15900232485097345037 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[482a 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315103A
[482c 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AD6435A073E445D106F4C9255A1D8AD1EE5323A5F1F668F97561C0ACA2BE7935
[482d 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[482e 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[482f 01-03 17:56:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4830 01-03 17:56:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[4831 01-03 17:56:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4832 01-03 17:56:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[4834 01-03 17:56:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[4833 01-03 17:56:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15900232485097345037 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[4835 01-03 17:56:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4836 01-03 17:56:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4837 01-03 17:56:21.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4838 01-03 17:56:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4839 01-03 17:56:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[483a 01-03 17:56:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[483b 01-03 17:56:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[483c 01-03 17:56:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[483d 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[483e 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[483f 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4840 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 64 35 a0 73 e4 45 d1 06 f4 c9 25 5a 1d 8a d1 |.d5.s.E....%Z...|
00000010 ee 53 23 a5 f1 f6 68 f9 75 61 c0 ac a2 be 79 35 |.S#...h.ua....y5|
[4841 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 b4 b0 d2 ff f9 33 71 81 58 6d 8c |0D. 0.....3q.Xm.|
00000010 f9 5d d7 7d e4 81 d0 ee bb 1d aa 09 51 d4 4e 1b |.].}........Q.N.|
00000020 3e e1 7b b4 02 20 74 78 54 04 46 6c fc eb a5 10 |>.{.. txT.Fl....|
00000030 96 1d e2 ce b9 f6 20 70 6d 5e 21 70 92 8d 96 a8 |...... pm^!p....|
00000040 20 17 fc 72 75 e5 | ..ru.|
[4842 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[4843 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 9f 9b 40 1a 66 14 4f 5b 1d b2 |0E.!....@.f.O[..|
00000010 c9 94 e7 72 ab 85 f5 20 87 14 71 59 92 68 d4 57 |...r... ..qY.h.W|
00000020 b2 c1 a3 fd 3c 02 20 08 92 01 48 45 57 d1 06 38 |....<. ...HEW..8|
00000030 b3 67 52 89 9d f2 2f 45 a3 0d 8c 58 fe 1a 0b 81 |.gR.../E...X....|
00000040 26 5b 5f 42 72 a0 60 |&[_Br.`|
[4844 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4845 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4846 01-03 17:56:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4847 01-03 17:56:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4848 01-03 17:56:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14227796457737582485 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[4849 01-03 17:56:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14227796457737582485 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[484a 01-03 17:56:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14227796457737582485 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[484b 01-03 17:56:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[484c 01-03 17:56:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[484d 01-03 17:56:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[484e 01-03 17:56:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[484f 01-03 17:56:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4850 01-03 17:56:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4851 01-03 17:56:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4852 01-03 17:56:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4853 01-03 17:56:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4854 01-03 17:56:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4855 01-03 17:56:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4856 01-03 17:56:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4857 01-03 17:56:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4858 01-03 17:56:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 ef 4a 01 6f 8d c2 b8 ab 54 a3 dd c1 eb cf e2 |..J.o....T......|
00000010 e2 93 b4 aa 02 a1 e8 bf 1a 45 be 74 93 55 10 53 |.........E.t.U.S|
[4859 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 96 36 91 56 76 0e 51 6a 31 bf |0E.!...6.Vv.Qj1.|
00000010 e5 e2 a1 36 28 1a ea e5 e8 f4 2d c0 ea d1 5e 08 |...6(.....-...^.|
00000020 ae e7 dc 29 48 02 20 2c d0 6e 04 b9 69 d1 97 2d |...)H. ,.n..i..-|
00000030 0a 2c 5e 1e 01 78 d3 0f cd 6e 70 07 a1 86 9f 56 |.,^..x...np....V|
00000040 89 66 a6 bf 2c d1 ee |.f..,..|
[485a 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[485b 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb0580 gate 1578074181360688400 evaluation starts
[485c 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb0580 signed by 0 principal evaluation starts (used [false])
[485d 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb0580 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[485e 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb0580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[485f 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb0580 principal evaluation fails
[4860 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb0580 gate 1578074181360688400 evaluation fails
[4861 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4862 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4863 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4864 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4865 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4866 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 ef 4a 01 6f 8d c2 b8 ab 54 a3 dd c1 eb cf e2 |..J.o....T......|
00000010 e2 93 b4 aa 02 a1 e8 bf 1a 45 be 74 93 55 10 53 |.........E.t.U.S|
[4867 01-03 17:56:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 96 36 91 56 76 0e 51 6a 31 bf |0E.!...6.Vv.Qj1.|
00000010 e5 e2 a1 36 28 1a ea e5 e8 f4 2d c0 ea d1 5e 08 |...6(.....-...^.|
00000020 ae e7 dc 29 48 02 20 2c d0 6e 04 b9 69 d1 97 2d |...)H. ,.n..i..-|
00000030 0a 2c 5e 1e 01 78 d3 0f cd 6e 70 07 a1 86 9f 56 |.,^..x...np....V|
00000040 89 66 a6 bf 2c d1 ee |.f..,..|
[4868 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4869 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f8d700 gate 1578074181370434600 evaluation starts
[486a 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f8d700 signed by 0 principal evaluation starts (used [false])
[486b 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f8d700 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[486c 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f8d700 principal evaluation succeeds for identity 0
[486d 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f8d700 gate 1578074181370434600 evaluation succeeds
[486e 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[486f 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4870 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4871 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4872 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[4873 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4874 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4875 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 64 35 a0 73 e4 45 d1 06 f4 c9 25 5a 1d 8a d1 |.d5.s.E....%Z...|
00000010 ee 53 23 a5 f1 f6 68 f9 75 61 c0 ac a2 be 79 35 |.S#...h.ua....y5|
[4876 01-03 17:56:21.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 b4 b0 d2 ff f9 33 71 81 58 6d 8c |0D. 0.....3q.Xm.|
00000010 f9 5d d7 7d e4 81 d0 ee bb 1d aa 09 51 d4 4e 1b |.].}........Q.N.|
00000020 3e e1 7b b4 02 20 74 78 54 04 46 6c fc eb a5 10 |>.{.. txT.Fl....|
00000030 96 1d e2 ce b9 f6 20 70 6d 5e 21 70 92 8d 96 a8 |...... pm^!p....|
00000040 20 17 fc 72 75 e5 | ..ru.|
[4877 01-03 17:56:21.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[4878 01-03 17:56:21.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[4879 01-03 17:56:21.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[487a 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[487b 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f ae ce d6 5c c5 d4 02 4f 9a 2b 89 29 2d fa 57 |....\...O.+.)-.W|
00000010 8b aa 9c 65 18 36 4a 2b 68 20 8e 30 05 bb c5 f2 |...e.6J+h .0....|
[487c 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 f8 8e 76 4c 84 89 1e 9c 67 44 |0E.!....vL....gD|
00000010 90 b7 7f a8 dc ed 74 91 b9 bc a9 54 d3 e1 6e 67 |......t....T..ng|
00000020 c3 6e 69 9a 33 02 20 52 0c ba 83 5e b0 10 e5 71 |.ni.3. R...^...q|
00000030 4e 10 f2 8b 47 ce 4c ec 16 ff 83 88 d4 dc e2 b3 |N...G.L.........|
00000040 3d f3 d7 b6 fb 13 3d |=.....=|
[487d 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[487e 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[487f 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4880 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4881 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4882 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4883 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4884 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4885 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4886 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4887 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4888 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[4889 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[488a 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[488b 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[488c 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[488d 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[488e 01-03 17:56:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[488f 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4890 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4891 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4892 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4893 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4894 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4895 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4896 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4897 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 20 46 c1 b6 fb 80 fa 52 36 5a 00 18 56 3b fe |. F.....R6Z..V;.|
00000010 64 42 08 5c 2d c5 66 6e a4 35 00 a1 e0 8a 04 27 |dB.\-.fn.5.....'|
[4898 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c bd 06 3a 85 5d c9 8c 79 1a 46 e9 |0D. l..:.]..y.F.|
00000010 29 81 7f 33 bb ee 73 82 20 4f 10 74 65 1f 26 50 |)..3..s. O.te.&P|
00000020 1c 82 03 be 02 20 09 4b 56 36 9d a8 11 7c bc da |..... .KV6...|..|
00000030 ab d5 28 32 b8 1a f7 68 56 ce ba 7c 10 60 6b e7 |..(2...hV..|.`k.|
00000040 8e 2c 5b d0 7d 9a |.,[.}.|
[4899 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[489a 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb1910 gate 1578074181427918700 evaluation starts
[489b 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb1910 signed by 0 principal evaluation starts (used [false])
[489c 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb1910 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[489d 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb1910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[489e 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb1910 principal evaluation fails
[489f 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fb1910 gate 1578074181427918700 evaluation fails
[48a0 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[48a1 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[48a2 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[48a4 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[48a3 01-03 17:56:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 20 46 c1 b6 fb 80 fa 52 36 5a 00 18 56 3b fe |. F.....R6Z..V;.|
00000010 64 42 08 5c 2d c5 66 6e a4 35 00 a1 e0 8a 04 27 |dB.\-.fn.5.....'|
[48a6 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c bd 06 3a 85 5d c9 8c 79 1a 46 e9 |0D. l..:.]..y.F.|
00000010 29 81 7f 33 bb ee 73 82 20 4f 10 74 65 1f 26 50 |)..3..s. O.te.&P|
00000020 1c 82 03 be 02 20 09 4b 56 36 9d a8 11 7c bc da |..... .KV6...|..|
00000030 ab d5 28 32 b8 1a f7 68 56 ce ba 7c 10 60 6b e7 |..(2...hV..|.`k.|
00000040 8e 2c 5b d0 7d 9a |.,[.}.|
[48a8 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[48a9 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fee210 gate 1578074181433028900 evaluation starts
[48aa 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fee210 signed by 0 principal evaluation starts (used [false])
[48ab 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fee210 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[48ac 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fee210 principal evaluation succeeds for identity 0
[48ad 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fee210 gate 1578074181433028900 evaluation succeeds
[48ae 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[48a7 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[48a5 01-03 17:56:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[48af 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[48b1 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[48b0 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[48b2 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[48b3 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[48b4 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[48b5 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[48b6 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[48b7 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[48b8 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[48b9 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fdbb70 gate 1578074181445804100 evaluation starts
[48ba 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fdbb70 signed by 0 principal evaluation starts (used [false])
[48bb 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fdbb70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[48bc 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fdbb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[48bd 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fdbb70 principal evaluation fails
[48be 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008fdbb70 gate 1578074181445804100 evaluation fails
[48bf 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[48c0 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[48c1 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[48c2 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[48c3 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[48c4 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[48c5 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00900c470 gate 1578074181446299000 evaluation starts
[48c6 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00900c470 signed by 0 principal evaluation starts (used [false])
[48c7 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00900c470 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[48c8 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00900c470 principal evaluation succeeds for identity 0
[48c9 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00900c470 gate 1578074181446299000 evaluation succeeds
[48ca 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[48cb 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[48cc 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[48cd 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[48ce 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[48cf 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[48d0 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[48d1 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[48d2 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[48d3 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[48d4 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48d5 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[48d6 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f ae ce d6 5c c5 d4 02 4f 9a 2b 89 29 2d fa 57 |....\...O.+.)-.W|
00000010 8b aa 9c 65 18 36 4a 2b 68 20 8e 30 05 bb c5 f2 |...e.6J+h .0....|
[48d7 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 f8 8e 76 4c 84 89 1e 9c 67 44 |0E.!....vL....gD|
00000010 90 b7 7f a8 dc ed 74 91 b9 bc a9 54 d3 e1 6e 67 |......t....T..ng|
00000020 c3 6e 69 9a 33 02 20 52 0c ba 83 5e b0 10 e5 71 |.ni.3. R...^...q|
00000030 4e 10 f2 8b 47 ce 4c ec 16 ff 83 88 d4 dc e2 b3 |N...G.L.........|
00000040 3d f3 d7 b6 fb 13 3d |=.....=|
[48d8 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[48d9 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48da 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[48db 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 64 35 a0 73 e4 45 d1 06 f4 c9 25 5a 1d 8a d1 |.d5.s.E....%Z...|
00000010 ee 53 23 a5 f1 f6 68 f9 75 61 c0 ac a2 be 79 35 |.S#...h.ua....y5|
[48dc 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 b4 b0 d2 ff f9 33 71 81 58 6d 8c |0D. 0.....3q.Xm.|
00000010 f9 5d d7 7d e4 81 d0 ee bb 1d aa 09 51 d4 4e 1b |.].}........Q.N.|
00000020 3e e1 7b b4 02 20 74 78 54 04 46 6c fc eb a5 10 |>.{.. txT.Fl....|
00000030 96 1d e2 ce b9 f6 20 70 6d 5e 21 70 92 8d 96 a8 |...... pm^!p....|
00000040 20 17 fc 72 75 e5 | ..ru.|
[48dd 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[48de 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[48df 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48e0 01-03 17:56:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48e1 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[48e2 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[48e3 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[48e4 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[48e5 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[48e6 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[48e7 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[48e8 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[48e9 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[48ea 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[48eb 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[48ec 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009034c30 gate 1578074181452421100 evaluation starts
[48ed 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009034c30 signed by 0 principal evaluation starts (used [false])
[48ee 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009034c30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[48ef 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009034c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[48f0 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009034c30 principal evaluation fails
[48f1 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009034c30 gate 1578074181452421100 evaluation fails
[48f2 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[48f3 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[48f4 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[48f5 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[48f6 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[48f7 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[48f8 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009035530 gate 1578074181453009500 evaluation starts
[48f9 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009035530 signed by 0 principal evaluation starts (used [false])
[48fa 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009035530 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[48fb 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009035530 principal evaluation succeeds for identity 0
[48fc 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009035530 gate 1578074181453009500 evaluation succeeds
[48fd 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[48fe 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[48ff 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4900 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4901 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4902 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4903 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4904 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4905 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4906 01-03 17:56:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4907 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4908 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4909 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[490a 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[490b 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510141801
[490c 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ACD284A49673D10B135F6511AED43FBD104BF33A24B570F10395A0C13C854CD9
[490d 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[490e 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[490f 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4910 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4911 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4912 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4913 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4914 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4915 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4916 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4917 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4918 01-03 17:56:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4919 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[491a 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[491b 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009047ed0 gate 1578074181475152100 evaluation starts
[491c 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009047ed0 signed by 0 principal evaluation starts (used [false])
[491d 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009047ed0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[491e 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009047ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[491f 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009047ed0 principal evaluation fails
[4920 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:20 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[4921 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009047ed0 gate 1578074181475152100 evaluation fails
[4922 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4923 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4924 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4925 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4926 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4927 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4928 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4929 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:20 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[492a 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[492b 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[492c 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090627d0 gate 1578074181476078800 evaluation starts
[492d 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090627d0 signed by 0 principal evaluation starts (used [false])
[492e 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090627d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[492f 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090627d0 principal evaluation succeeds for identity 0
[4930 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090627d0 gate 1578074181476078800 evaluation succeeds
[4931 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4932 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4933 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4934 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4935 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4936 01-03 17:56:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4937 01-03 17:56:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4938 01-03 17:56:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4939 01-03 17:56:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[493a 01-03 17:56:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[493b 01-03 17:56:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[493c 01-03 17:56:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[493d 01-03 17:56:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[493e 01-03 17:56:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[493f 01-03 17:56:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4940 01-03 17:56:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088230 gate 1578074181497141200 evaluation starts
[4941 01-03 17:56:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088230 signed by 0 principal evaluation starts (used [false])
[4942 01-03 17:56:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088230 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4943 01-03 17:56:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4944 01-03 17:56:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088230 principal evaluation fails
[4945 01-03 17:56:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088230 gate 1578074181497141200 evaluation fails
[4946 01-03 17:56:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4947 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4948 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4949 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[494a 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[494b 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[494c 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00902d710 gate 1578074181507030300 evaluation starts
[494d 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00902d710 signed by 0 principal evaluation starts (used [false])
[494e 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00902d710 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[494f 01-03 17:56:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00902d710 principal evaluation succeeds for identity 0
[4950 01-03 17:56:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00902d710 gate 1578074181507030300 evaluation succeeds
[4951 01-03 17:56:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4952 01-03 17:56:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4953 01-03 17:56:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4955 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4954 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4956 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4957 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4958 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4959 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[495a 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11514408950546415704 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[495b 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11514408950546415704 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[495c 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[495d 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[495e 01-03 17:56:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[495f 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4960 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4961 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4962 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4963 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4964 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4965 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4966 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4967 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4968 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4969 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[496a 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[496b 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099520 gate 1578074181533897600 evaluation starts
[496c 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099520 signed by 0 principal evaluation starts (used [false])
[496d 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099520 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[496e 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[496f 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099520 principal evaluation fails
[4970 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099520 gate 1578074181533897600 evaluation fails
[4971 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4972 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4973 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4974 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4975 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4976 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4977 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099e20 gate 1578074181535134400 evaluation starts
[4978 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099e20 signed by 0 principal evaluation starts (used [false])
[4979 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099e20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[497a 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099e20 principal evaluation succeeds for identity 0
[497b 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009099e20 gate 1578074181535134400 evaluation succeeds
[497c 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[497d 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[497e 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[497f 01-03 17:56:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4980 01-03 17:56:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4981 01-03 17:56:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4982 01-03 17:56:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4983 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4984 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4985 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4986 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4987 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4988 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4989 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[498a 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[498b 01-03 17:56:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[498c 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[498d 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090b5f30 gate 1578074181564302900 evaluation starts
[498e 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090b5f30 signed by 0 principal evaluation starts (used [false])
[498f 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090b5f30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4990 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090b5f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4991 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090b5f30 principal evaluation fails
[4992 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090b5f30 gate 1578074181564302900 evaluation fails
[4993 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4994 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4995 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4996 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4997 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4998 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4999 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090ce830 gate 1578074181567120700 evaluation starts
[499a 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090ce830 signed by 0 principal evaluation starts (used [false])
[499b 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090ce830 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[499c 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090ce830 principal evaluation succeeds for identity 0
[499d 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090ce830 gate 1578074181567120700 evaluation succeeds
[499e 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[499f 01-03 17:56:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[49a0 01-03 17:56:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[49a1 01-03 17:56:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[49a2 01-03 17:56:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[49a3 01-03 17:56:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[49a4 01-03 17:56:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49a5 01-03 17:56:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11514408950546415704 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[49a6 01-03 17:56:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11514408950546415704 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[49a7 01-03 17:56:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49a8 01-03 17:56:21.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[49a9 01-03 17:56:21.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49aa 01-03 17:56:21.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49ab 01-03 17:56:21.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49ac 01-03 17:56:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12474180225875960642 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[49ad 01-03 17:56:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12474180225875960642 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[49ae 01-03 17:56:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[49af 01-03 17:56:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49b0 01-03 17:56:21.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[49b1 01-03 17:56:21.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49b2 01-03 17:56:21.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[49b3 01-03 17:56:21.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[49b4 01-03 17:56:21.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 1c b6 68 08 8b bc f4 4b bb a0 9d 6d 61 9b 47 |B..h....K...ma.G|
00000010 c4 2f 60 72 0d af 2e dd 41 1b d9 c3 1e f4 5f d3 |./`r....A....._.|
[49b5 01-03 17:56:21.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 dc 9c 45 54 84 a2 8f ef 2f ae 03 |0D. ...ET..../..|
00000010 eb 0e 77 da 87 36 79 a5 5a ed 98 8e ce a3 f4 12 |..w..6y.Z.......|
00000020 aa b9 5b 1a 02 20 35 41 8b 7c 7b 91 ed 19 d8 a7 |..[.. 5A.|{.....|
00000030 a2 de 69 de e8 d9 56 0e cc c5 10 d2 20 ff 25 99 |..i...V..... .%.|
00000040 20 b7 77 dd ac 92 | .w...|
[49b6 01-03 17:56:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[49b7 01-03 17:56:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 48 18 7b f3 a8 2e 98 7c 38 63 ff |0D. tH.{....|8c.|
00000010 8a d0 22 73 01 63 c2 8c b1 20 e9 5c 9d e8 8c bb |.."s.c... .\....|
00000020 79 75 b7 56 02 20 5a 37 22 e6 85 3c 5d 9b 20 ef |yu.V. Z7"..<]. .|
00000030 72 36 63 ec 15 1e 88 e1 d9 11 b1 7d 82 08 8f bf |r6c........}....|
00000040 d8 14 cf 98 69 90 |....i.|
[49b8 01-03 17:56:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[49b9 01-03 17:56:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[49ba 01-03 17:56:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62
[49bb 01-03 17:56:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62
[49bc 01-03 17:56:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[49bd 01-03 17:56:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49be 01-03 17:56:21.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49bf 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49c0 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49c1 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49c2 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49c3 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[49c4 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49c5 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[49c6 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[49c7 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49c8 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[49c9 01-03 17:56:21.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49ca 01-03 17:56:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[49cb 01-03 17:56:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[49cc 01-03 17:56:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49cd 01-03 17:56:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[49ce 01-03 17:56:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49cf 01-03 17:56:21.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[49d0 01-03 17:56:21.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[49d1 01-03 17:56:21.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[49d2 01-03 17:56:21.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49d3 01-03 17:56:21.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49d4 01-03 17:56:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[49d5 01-03 17:56:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[49d6 01-03 17:56:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49d7 01-03 17:56:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49d8 01-03 17:56:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49d9 01-03 17:56:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49da 01-03 17:56:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[49db 01-03 17:56:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[49dc 01-03 17:56:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49dd 01-03 17:56:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49de 01-03 17:56:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49df 01-03 17:56:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49e0 01-03 17:56:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[49e1 01-03 17:56:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[49e2 01-03 17:56:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49e3 01-03 17:56:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[49e4 01-03 17:56:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[49e5 01-03 17:56:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49e6 01-03 17:56:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[49e7 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[49e8 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[49e9 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[49ea 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[49eb 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[49ec 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 da 0d 9e 6b fc 98 78 99 91 7c fc a8 9e 8e 64 |....k..x..|....d|
00000010 cb ee d4 43 72 c5 d7 ae 44 35 97 eb c5 d3 05 38 |...Cr...D5.....8|
[49ed 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 73 2a 85 6c a3 c3 1b 4d e7 64 9f |0D. ds*.l...M.d.|
00000010 b8 a4 88 f4 92 1c 44 9c 92 d0 f5 09 25 a2 84 9a |......D.....%...|
00000020 99 4c f7 89 02 20 65 ad 98 4a 21 a4 46 98 5b 16 |.L... e..J!.F.[.|
00000030 89 4c 84 7c da 9d f0 55 94 8a 25 8f ba f7 03 4f |.L.|...U..%....O|
00000040 e0 48 da f4 7e 9c |.H..~.|
[49ee 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[49ef 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df840 gate 1578074182973056200 evaluation starts
[49f0 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df840 signed by 0 principal evaluation starts (used [false])
[49f1 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df840 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[49f2 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[49f3 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df840 principal evaluation fails
[49f4 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df840 gate 1578074182973056200 evaluation fails
[49f5 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[49f6 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[49f7 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[49f8 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 da 0d 9e 6b fc 98 78 99 91 7c fc a8 9e 8e 64 |....k..x..|....d|
00000010 cb ee d4 43 72 c5 d7 ae 44 35 97 eb c5 d3 05 38 |...Cr...D5.....8|
[49f9 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 73 2a 85 6c a3 c3 1b 4d e7 64 9f |0D. ds*.l...M.d.|
00000010 b8 a4 88 f4 92 1c 44 9c 92 d0 f5 09 25 a2 84 9a |......D.....%...|
00000020 99 4c f7 89 02 20 65 ad 98 4a 21 a4 46 98 5b 16 |.L... e..J!.F.[.|
00000030 89 4c 84 7c da 9d f0 55 94 8a 25 8f ba f7 03 4f |.L.|...U..%....O|
00000040 e0 48 da f4 7e 9c |.H..~.|
[49fa 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[49fb 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009136140 gate 1578074182973531500 evaluation starts
[49fc 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009136140 signed by 0 principal evaluation starts (used [false])
[49fd 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009136140 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[49fe 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009136140 principal evaluation succeeds for identity 0
[49ff 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009136140 gate 1578074182973531500 evaluation succeeds
[4a00 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4a01 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4a02 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4a03 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4a04 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a05 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes]}
[4a06 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60
[4a07 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60
[4a08 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4a09 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a0a 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a0b 01-03 17:56:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a0c 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a0d 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a0e 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a0f 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a10 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a11 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a12 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a13 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4a14 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a15 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4a16 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a17 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a18 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a19 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a1a 01-03 17:56:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a1b 01-03 17:56:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a1c 01-03 17:56:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a1d 01-03 17:56:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a1e 01-03 17:56:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a1f 01-03 17:56:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a20 01-03 17:56:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a21 01-03 17:56:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a22 01-03 17:56:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a23 01-03 17:56:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a24 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a25 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a26 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a27 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4a28 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a29 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4a2a 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4a2b 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4a2c 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4a2d 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4a2e 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4a2f 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 62 fd 3a 3c fd d5 4e e7 97 d0 8c b8 90 52 51 |.b.:<..N......RQ|
00000010 68 a6 3e d4 f8 5d 87 7d 57 31 c7 13 52 ad c2 91 |h.>..].}W1..R...|
[4a30 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 08 42 73 8f 9b cf 89 12 a1 1a |0E.!...Bs.......|
00000010 54 48 78 13 ff 4f d0 5c 7e a2 e0 ae f4 19 d5 9a |THx..O.\~.......|
00000020 50 2e 92 ff f6 02 20 61 41 2d b4 ac a4 24 20 95 |P..... aA-...$ .|
00000030 87 e6 d7 13 e6 24 27 9a 5d e3 df 2f 13 80 4b 9f |.....$'.]../..K.|
00000040 1d ef 74 8a 67 4f 58 |..t.gOX|
[4a31 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4a32 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091644d0 gate 1578074183068171500 evaluation starts
[4a33 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091644d0 signed by 0 principal evaluation starts (used [false])
[4a34 01-03 17:56:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091644d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4a35 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091644d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4a36 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091644d0 principal evaluation fails
[4a37 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091644d0 gate 1578074183068171500 evaluation fails
[4a38 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4a39 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4a3a 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4a3b 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 62 fd 3a 3c fd d5 4e e7 97 d0 8c b8 90 52 51 |.b.:<..N......RQ|
00000010 68 a6 3e d4 f8 5d 87 7d 57 31 c7 13 52 ad c2 91 |h.>..].}W1..R...|
[4a3c 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 08 42 73 8f 9b cf 89 12 a1 1a |0E.!...Bs.......|
00000010 54 48 78 13 ff 4f d0 5c 7e a2 e0 ae f4 19 d5 9a |THx..O.\~.......|
00000020 50 2e 92 ff f6 02 20 61 41 2d b4 ac a4 24 20 95 |P..... aA-...$ .|
00000030 87 e6 d7 13 e6 24 27 9a 5d e3 df 2f 13 80 4b 9f |.....$'.]../..K.|
00000040 1d ef 74 8a 67 4f 58 |..t.gOX|
[4a3d 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4a3e 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009164dd0 gate 1578074183071038700 evaluation starts
[4a3f 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009164dd0 signed by 0 principal evaluation starts (used [false])
[4a40 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009164dd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4a41 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009164dd0 principal evaluation succeeds for identity 0
[4a42 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009164dd0 gate 1578074183071038700 evaluation succeeds
[4a43 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4a44 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4a45 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4a46 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4a47 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a48 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes]}
[4a49 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62
[4a4a 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62
[4a4b 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4a4c 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a4d 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a4e 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a4f 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a50 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a51 01-03 17:56:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a52 01-03 17:56:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a53 01-03 17:56:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a54 01-03 17:56:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a55 01-03 17:56:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a56 01-03 17:56:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4a57 01-03 17:56:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a58 01-03 17:56:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4a59 01-03 17:56:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a5a 01-03 17:56:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a5b 01-03 17:56:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a5c 01-03 17:56:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a5d 01-03 17:56:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a5e 01-03 17:56:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a5f 01-03 17:56:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a60 01-03 17:56:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a61 01-03 17:56:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a62 01-03 17:56:23.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315103B
[4a63 01-03 17:56:23.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B469A5A03B70E3238555FCF7D35DD0DEF3D7B3D69BB9E12C481316A81A2FE55A
[4a64 01-03 17:56:23.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4a65 01-03 17:56:23.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4a66 01-03 17:56:23.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[4a67 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a68 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a69 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[4a6a 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a6b 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4a6c 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a6d 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4a6e 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[4a6f 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a70 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4a71 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a72 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[4a73 01-03 17:56:23.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a74 01-03 17:56:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:583936131129721995 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4a75 01-03 17:56:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:583936131129721995 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4a76 01-03 17:56:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4a77 01-03 17:56:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a78 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4a79 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a7a 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4a7b 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4a7c 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 b5 c0 38 55 b7 6b 75 0b 21 11 7c 2e 1f 0b 2b |g..8U.ku.!.|...+|
00000010 8c 9d 6c 26 5a 4b 00 87 b8 05 30 6b 90 c9 47 96 |..l&ZK....0k..G.|
[4a7d 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce dd 72 e9 71 84 07 22 4a d2 61 |0E.!...r.q.."J.a|
00000010 a5 cf 49 a1 b1 af 9d 26 b0 8c 44 95 2e f4 77 6d |..I....&..D...wm|
00000020 8c 06 ca ff 67 02 20 10 80 ac 73 22 ad 44 f7 ef |....g. ...s".D..|
00000030 7d 93 fc 3c 6c 03 5f 0d 1b d8 71 80 23 4f 2d 43 |}..<l._...q.#O-C|
00000040 23 02 dc ba ee 54 8c |#....T.|
[4a7e 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4a7f 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 49 34 72 b1 f6 f1 9d e1 ab 67 c2 |0D. OI4r......g.|
00000010 9e 2f 21 06 55 9a d6 7a 85 d0 71 fb ac 6f 1c 8e |./!.U..z..q..o..|
00000020 38 10 1f 10 02 20 04 2a e0 e1 2c 95 76 f3 74 d6 |8.... .*..,.v.t.|
00000030 72 da 9e 6d 47 4f 5f 11 16 58 fb 5a aa 23 1e 45 |r..mGO_..X.Z.#.E|
00000040 69 a4 3f 31 fe 69 |i.?1.i|
[4a80 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4a81 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4a82 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63
[4a83 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63
[4a84 01-03 17:56:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4a85 01-03 17:56:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a86 01-03 17:56:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a87 01-03 17:56:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4a88 01-03 17:56:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a89 01-03 17:56:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a8a 01-03 17:56:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[4a8b 01-03 17:56:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[4a8c 01-03 17:56:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[4a8d 01-03 17:56:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a8e 01-03 17:56:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a8f 01-03 17:56:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:11530188355663147503 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4a90 01-03 17:56:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:11530188355663147503 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4a91 01-03 17:56:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11530188355663147503 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4a92 01-03 17:56:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a93 01-03 17:56:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a94 01-03 17:56:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a95 01-03 17:56:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a96 01-03 17:56:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a97 01-03 17:56:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a98 01-03 17:56:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[4a99 01-03 17:56:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a9a 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1370759583970571642 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4a9b 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:1370759583970571642 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4a9c 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1370759583970571642 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4a9d 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a9e 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a9f 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4aa0 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4aa1 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4aa2 01-03 17:56:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4aa3 01-03 17:56:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[4aa4 01-03 17:56:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4aa5 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4aa6 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4aa7 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4aa8 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4aa9 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4aaa 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4aab 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4aac 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4aad 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4aae 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4aaf 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4ab0 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4ab1 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 e6 6e 65 18 7e ab 74 5d 44 fb ff 1f 6d 4f 43 |..ne.~.t]D...mOC|
00000010 d0 5e dc 0c 68 ca 56 db dd e9 14 b5 fb 9f b9 73 |.^..h.V........s|
[4ab2 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 79 c1 30 d6 6f 9e f2 3c 48 11 96 |0D. {y.0.o..<H..|
00000010 ee 76 43 3e cf 28 b6 b0 7f 52 51 f5 7b d2 90 c0 |.vC>.(...RQ.{...|
00000020 10 76 c4 0b 02 20 13 fc d8 d2 1a a5 1d ce 6c 3b |.v... ........l;|
00000030 79 51 03 16 7a 1f ce 05 73 4f 46 3c fa ef 34 6a |yQ..z...sOF<..4j|
00000040 3b 98 b9 20 28 bc |;.. (.|
[4ab3 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ab4 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091ded30 gate 1578074185148009800 evaluation starts
[4ab5 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091ded30 signed by 0 principal evaluation starts (used [false])
[4ab6 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091ded30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4ab7 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091ded30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4ab8 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091ded30 principal evaluation fails
[4ab9 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091ded30 gate 1578074185148009800 evaluation fails
[4aba 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4abb 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4abc 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4abd 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 e6 6e 65 18 7e ab 74 5d 44 fb ff 1f 6d 4f 43 |..ne.~.t]D...mOC|
00000010 d0 5e dc 0c 68 ca 56 db dd e9 14 b5 fb 9f b9 73 |.^..h.V........s|
[4abe 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 79 c1 30 d6 6f 9e f2 3c 48 11 96 |0D. {y.0.o..<H..|
00000010 ee 76 43 3e cf 28 b6 b0 7f 52 51 f5 7b d2 90 c0 |.vC>.(...RQ.{...|
00000020 10 76 c4 0b 02 20 13 fc d8 d2 1a a5 1d ce 6c 3b |.v... ........l;|
00000030 79 51 03 16 7a 1f ce 05 73 4f 46 3c fa ef 34 6a |yQ..z...sOF<..4j|
00000040 3b 98 b9 20 28 bc |;.. (.|
[4abf 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ac0 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091df630 gate 1578074185148545600 evaluation starts
[4ac1 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091df630 signed by 0 principal evaluation starts (used [false])
[4ac2 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091df630 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4ac3 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091df630 principal evaluation succeeds for identity 0
[4ac4 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091df630 gate 1578074185148545600 evaluation succeeds
[4ac5 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4ac6 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4ac7 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4ac8 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4ac9 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4aca 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes]}
[4acb 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63
[4acc 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63
[4acd 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4ace 01-03 17:56:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ad0 01-03 17:56:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4acf 01-03 17:56:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4ad1 01-03 17:56:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4ad2 01-03 17:56:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[4ad3 01-03 17:56:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ad4 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ad5 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ad6 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[4ad7 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4ad8 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4ad9 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ada 01-03 17:56:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4adb 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4adc 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4add 01-03 17:56:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4ade 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4adf 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4ae0 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4ae1 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4ae2 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4ae3 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4ae4 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4ae5 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a6 a3 f1 58 3c 1c 29 23 80 bf 7a 33 fd db d1 |u...X<.)#..z3...|
00000010 58 31 0a 3e 7c 5a c3 e9 50 92 ae fa a1 44 f9 dc |X1.>|Z..P....D..|
[4ae6 01-03 17:56:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 23 91 6b 1d 5c 49 ce a7 2e c3 |0E.!..#.k.\I....|
00000010 0c d2 b8 77 29 ea ba 7c b8 93 98 f3 59 1b bc 8e |...w)..|....Y...|
00000020 0f 57 8b 8a 29 02 20 13 52 92 38 2e f1 7c d6 53 |.W..). .R.8..|.S|
00000030 17 63 3c 5a 2a 00 59 7f 4a 07 f4 f3 5b 43 d8 31 |.c<Z*.Y.J...[C.1|
00000040 fa 4a 7a 8a bd 47 24 |.Jz..G$|
[4ae7 01-03 17:56:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ae8 01-03 17:56:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091f5a00 gate 1578074185183873300 evaluation starts
[4ae9 01-03 17:56:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091f5a00 signed by 0 principal evaluation starts (used [false])
[4aea 01-03 17:56:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091f5a00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4aeb 01-03 17:56:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091f5a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4aec 01-03 17:56:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091f5a00 principal evaluation fails
[4aed 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091f5a00 gate 1578074185183873300 evaluation fails
[4aee 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4aef 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4af0 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4af1 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a6 a3 f1 58 3c 1c 29 23 80 bf 7a 33 fd db d1 |u...X<.)#..z3...|
00000010 58 31 0a 3e 7c 5a c3 e9 50 92 ae fa a1 44 f9 dc |X1.>|Z..P....D..|
[4af2 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 23 91 6b 1d 5c 49 ce a7 2e c3 |0E.!..#.k.\I....|
00000010 0c d2 b8 77 29 ea ba 7c b8 93 98 f3 59 1b bc 8e |...w)..|....Y...|
00000020 0f 57 8b 8a 29 02 20 13 52 92 38 2e f1 7c d6 53 |.W..). .R.8..|.S|
00000030 17 63 3c 5a 2a 00 59 7f 4a 07 f4 f3 5b 43 d8 31 |.c<Z*.Y.J...[C.1|
00000040 fa 4a 7a 8a bd 47 24 |.Jz..G$|
[4af3 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4af4 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009214300 gate 1578074185193202300 evaluation starts
[4af5 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009214300 signed by 0 principal evaluation starts (used [false])
[4af6 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009214300 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4af7 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009214300 principal evaluation succeeds for identity 0
[4af8 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009214300 gate 1578074185193202300 evaluation succeeds
[4af9 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4afa 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4afb 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4afc 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4afd 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4afe 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes]}
[4aff 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61
[4b00 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61
[4b01 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4b02 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b03 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b04 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b05 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[4b06 01-03 17:56:25.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b07 01-03 17:56:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b08 01-03 17:56:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b09 01-03 17:56:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[4b0a 01-03 17:56:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4b0b 01-03 17:56:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b0c 01-03 17:56:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4b0d 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[4b0e 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12246789788868837257 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4b0f 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4b10 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5218117151106128962 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4b11 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[4b12 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3114291915716378851 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4b13 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3114291915716378851 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4b14 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b15 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12246789788868837257 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4b16 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b17 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5218117151106128962 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4b18 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b19 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3114291915716378851 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[4b1a 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3114291915716378851 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[4b1b 01-03 17:56:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b1c 01-03 17:56:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5218117151106128962 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4b1d 01-03 17:56:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5218117151106128962 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4b1e 01-03 17:56:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5218117151106128962 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[4b1f 01-03 17:56:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b20 01-03 17:56:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12246789788868837257 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[4b21 01-03 17:56:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12246789788868837257 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[4b22 01-03 17:56:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12246789788868837257 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[4b23 01-03 17:56:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b24 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315103C
[4b25 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B08908A63FE3BFC7951E1DB40DC27727F5C83A7F0932855F013E7E5341D6199B
[4b26 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4b27 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4b28 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b29 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[4b2a 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b2b 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4b2c 01-03 17:56:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b2d 01-03 17:56:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[4b2e 01-03 17:56:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[4b2f 01-03 17:56:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4b30 01-03 17:56:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b31 01-03 17:56:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[4b32 01-03 17:56:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b33 01-03 17:56:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4b34 01-03 17:56:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4b35 01-03 17:56:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b36 01-03 17:56:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4b37 01-03 17:56:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4b38 01-03 17:56:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b39 01-03 17:56:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4b3a 01-03 17:56:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4b3b 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4b3c 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4b3d 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4b3e 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4b3f 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 e6 6e 65 18 7e ab 74 5d 44 fb ff 1f 6d 4f 43 |..ne.~.t]D...mOC|
00000010 d0 5e dc 0c 68 ca 56 db dd e9 14 b5 fb 9f b9 73 |.^..h.V........s|
[4b40 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 79 c1 30 d6 6f 9e f2 3c 48 11 96 |0D. {y.0.o..<H..|
00000010 ee 76 43 3e cf 28 b6 b0 7f 52 51 f5 7b d2 90 c0 |.vC>.(...RQ.{...|
00000020 10 76 c4 0b 02 20 13 fc d8 d2 1a a5 1d ce 6c 3b |.v... ........l;|
00000030 79 51 03 16 7a 1f ce 05 73 4f 46 3c fa ef 34 6a |yQ..z...sOF<..4j|
00000040 3b 98 b9 20 28 bc |;.. (.|
[4b41 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4b42 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091b1580 gate 1578074185311902800 evaluation starts
[4b43 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091b1580 signed by 0 principal evaluation starts (used [false])
[4b44 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091b1580 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4b45 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091b1580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4b46 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091b1580 principal evaluation fails
[4b47 01-03 17:56:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0091b1580 gate 1578074185311902800 evaluation fails
[4b4a 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4b48 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[4b49 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4b4b 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4b4c 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4b4d 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 e6 6e 65 18 7e ab 74 5d 44 fb ff 1f 6d 4f 43 |..ne.~.t]D...mOC|
00000010 d0 5e dc 0c 68 ca 56 db dd e9 14 b5 fb 9f b9 73 |.^..h.V........s|
[4b4e 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 79 c1 30 d6 6f 9e f2 3c 48 11 96 |0D. {y.0.o..<H..|
00000010 ee 76 43 3e cf 28 b6 b0 7f 52 51 f5 7b d2 90 c0 |.vC>.(...RQ.{...|
00000020 10 76 c4 0b 02 20 13 fc d8 d2 1a a5 1d ce 6c 3b |.v... ........l;|
00000030 79 51 03 16 7a 1f ce 05 73 4f 46 3c fa ef 34 6a |yQ..z...sOF<..4j|
00000040 3b 98 b9 20 28 bc |;.. (.|
[4b4f 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4b50 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088390 gate 1578074185324643300 evaluation starts
[4b51 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088390 signed by 0 principal evaluation starts (used [false])
[4b52 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088390 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4b53 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088390 principal evaluation succeeds for identity 0
[4b54 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc009088390 gate 1578074185324643300 evaluation succeeds
[4b55 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4b56 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4b57 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4b58 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4b59 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4b5a 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b5b 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4b5c 01-03 17:56:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 b5 c0 38 55 b7 6b 75 0b 21 11 7c 2e 1f 0b 2b |g..8U.ku.!.|...+|
00000010 8c 9d 6c 26 5a 4b 00 87 b8 05 30 6b 90 c9 47 96 |..l&ZK....0k..G.|
[4b5d 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce dd 72 e9 71 84 07 22 4a d2 61 |0E.!...r.q.."J.a|
00000010 a5 cf 49 a1 b1 af 9d 26 b0 8c 44 95 2e f4 77 6d |..I....&..D...wm|
00000020 8c 06 ca ff 67 02 20 10 80 ac 73 22 ad 44 f7 ef |....g. ...s".D..|
00000030 7d 93 fc 3c 6c 03 5f 0d 1b d8 71 80 23 4f 2d 43 |}..<l._...q.#O-C|
00000040 23 02 dc ba ee 54 8c |#....T.|
[4b5e 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[4b5f 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b60 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4b61 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 89 08 a6 3f e3 bf c7 95 1e 1d b4 0d c2 77 27 |....?.........w'|
00000010 f5 c8 3a 7f 09 32 85 5f 01 3e 7e 53 41 d6 19 9b |..:..2._.>~SA...|
[4b62 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 d3 ba 6a 1c e8 33 a2 fb 21 3e 1a |0D. Q..j..3..!>.|
00000010 4c 19 50 69 64 0f 6b 39 6a 17 29 e7 70 b0 75 47 |L.Pid.k9j.).p.uG|
00000020 21 2e 36 cc 02 20 44 a8 04 47 c5 f2 27 72 e0 c0 |!.6.. D..G..'r..|
00000030 66 ac 05 37 75 02 73 18 0c d3 c2 e2 08 4a 70 f5 |f..7u.s......Jp.|
00000040 90 77 a3 17 67 ab |.w..g.|
[4b63 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4b64 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4b65 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b66 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b67 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[4b68 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4b69 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 89 08 a6 3f e3 bf c7 95 1e 1d b4 0d c2 77 27 |....?.........w'|
00000010 f5 c8 3a 7f 09 32 85 5f 01 3e 7e 53 41 d6 19 9b |..:..2._.>~SA...|
[4b6a 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 d3 ba 6a 1c e8 33 a2 fb 21 3e 1a |0D. Q..j..3..!>.|
00000010 4c 19 50 69 64 0f 6b 39 6a 17 29 e7 70 b0 75 47 |L.Pid.k9j.).p.uG|
00000020 21 2e 36 cc 02 20 44 a8 04 47 c5 f2 27 72 e0 c0 |!.6.. D..G..'r..|
00000030 66 ac 05 37 75 02 73 18 0c d3 c2 e2 08 4a 70 f5 |f..7u.s......Jp.|
00000040 90 77 a3 17 67 ab |.w..g.|
[4b6b 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[4b6c 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 e2 ad 07 8d f8 a7 a2 97 96 d3 af |0D. e...........|
00000010 84 13 a9 c9 6d 3a d9 2b 79 f1 9f 68 59 11 f0 dd |....m:.+y..hY...|
00000020 55 7c 7d 3a 02 20 0a 0c b9 66 0b 75 ea fb fd ab |U|}:. ...f.u....|
00000030 8e d6 41 07 ba 16 9d 38 0f 04 ac 8b 1d 06 cd f0 |..A....8........|
00000040 3f c7 bd ac 4e f3 |?...N.|
[4b6d 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4b6e 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4b6f 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b70 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b71 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b72 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4b73 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b74 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4b75 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4b76 01-03 17:56:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b77 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4b78 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4b79 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4b7a 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4b7b 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4b7c 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4b7d 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a6 a3 f1 58 3c 1c 29 23 80 bf 7a 33 fd db d1 |u...X<.)#..z3...|
00000010 58 31 0a 3e 7c 5a c3 e9 50 92 ae fa a1 44 f9 dc |X1.>|Z..P....D..|
[4b7e 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 23 91 6b 1d 5c 49 ce a7 2e c3 |0E.!..#.k.\I....|
00000010 0c d2 b8 77 29 ea ba 7c b8 93 98 f3 59 1b bc 8e |...w)..|....Y...|
00000020 0f 57 8b 8a 29 02 20 13 52 92 38 2e f1 7c d6 53 |.W..). .R.8..|.S|
00000030 17 63 3c 5a 2a 00 59 7f 4a 07 f4 f3 5b 43 d8 31 |.c<Z*.Y.J...[C.1|
00000040 fa 4a 7a 8a bd 47 24 |.Jz..G$|
[4b7f 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4b80 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c30 gate 1578074185340593700 evaluation starts
[4b81 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c30 signed by 0 principal evaluation starts (used [false])
[4b82 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4b83 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4b84 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c30 principal evaluation fails
[4b85 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c30 gate 1578074185340593700 evaluation fails
[4b86 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4b87 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4b88 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4b89 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a6 a3 f1 58 3c 1c 29 23 80 bf 7a 33 fd db d1 |u...X<.)#..z3...|
00000010 58 31 0a 3e 7c 5a c3 e9 50 92 ae fa a1 44 f9 dc |X1.>|Z..P....D..|
[4b8a 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 23 91 6b 1d 5c 49 ce a7 2e c3 |0E.!..#.k.\I....|
00000010 0c d2 b8 77 29 ea ba 7c b8 93 98 f3 59 1b bc 8e |...w)..|....Y...|
00000020 0f 57 8b 8a 29 02 20 13 52 92 38 2e f1 7c d6 53 |.W..). .R.8..|.S|
00000030 17 63 3c 5a 2a 00 59 7f 4a 07 f4 f3 5b 43 d8 31 |.c<Z*.Y.J...[C.1|
00000040 fa 4a 7a 8a bd 47 24 |.Jz..G$|
[4b8b 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4b8c 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7530 gate 1578074185341947900 evaluation starts
[4b8d 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7530 signed by 0 principal evaluation starts (used [false])
[4b8e 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7530 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4b8f 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7530 principal evaluation succeeds for identity 0
[4b90 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7530 gate 1578074185341947900 evaluation succeeds
[4b91 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4b92 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4b93 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4b94 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4b95 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4b96 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b97 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4b98 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 89 08 a6 3f e3 bf c7 95 1e 1d b4 0d c2 77 27 |....?.........w'|
00000010 f5 c8 3a 7f 09 32 85 5f 01 3e 7e 53 41 d6 19 9b |..:..2._.>~SA...|
[4b99 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 d3 ba 6a 1c e8 33 a2 fb 21 3e 1a |0D. Q..j..3..!>.|
00000010 4c 19 50 69 64 0f 6b 39 6a 17 29 e7 70 b0 75 47 |L.Pid.k9j.).p.uG|
00000020 21 2e 36 cc 02 20 44 a8 04 47 c5 f2 27 72 e0 c0 |!.6.. D..G..'r..|
00000030 66 ac 05 37 75 02 73 18 0c d3 c2 e2 08 4a 70 f5 |f..7u.s......Jp.|
00000040 90 77 a3 17 67 ab |.w..g.|
[4b9a 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4b9b 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4b9c 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b9d 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4b9e 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 b5 c0 38 55 b7 6b 75 0b 21 11 7c 2e 1f 0b 2b |g..8U.ku.!.|...+|
00000010 8c 9d 6c 26 5a 4b 00 87 b8 05 30 6b 90 c9 47 96 |..l&ZK....0k..G.|
[4b9f 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce dd 72 e9 71 84 07 22 4a d2 61 |0E.!...r.q.."J.a|
00000010 a5 cf 49 a1 b1 af 9d 26 b0 8c 44 95 2e f4 77 6d |..I....&..D...wm|
00000020 8c 06 ca ff 67 02 20 10 80 ac 73 22 ad 44 f7 ef |....g. ...s".D..|
00000030 7d 93 fc 3c 6c 03 5f 0d 1b d8 71 80 23 4f 2d 43 |}..<l._...q.#O-C|
00000040 23 02 dc ba ee 54 8c |#....T.|
[4ba0 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[4ba1 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ba2 01-03 17:56:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ba3 01-03 17:56:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ba4 01-03 17:56:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ba5 01-03 17:56:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[4ba7 01-03 17:56:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[4ba8 01-03 17:56:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ba6 01-03 17:56:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[4ba9 01-03 17:56:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4baa 01-03 17:56:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[4bab 01-03 17:56:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bac 01-03 17:56:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4bad 01-03 17:56:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4bae 01-03 17:56:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4baf 01-03 17:56:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4bb0 01-03 17:56:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bb1 01-03 17:56:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bb2 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4bb3 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4bb4 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4bb5 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4bb6 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4bb7 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4bb8 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4bb9 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4bba 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4bbb 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2cd20 gate 1578074185442929800 evaluation starts
[4bbc 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2cd20 signed by 0 principal evaluation starts (used [false])
[4bbd 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2cd20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4bbe 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2cd20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4bbf 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2cd20 principal evaluation fails
[4bc0 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2cd20 gate 1578074185442929800 evaluation fails
[4bc1 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4bc2 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4bc3 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4bc4 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4bc5 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4bc6 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4bc7 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2d620 gate 1578074185445436000 evaluation starts
[4bc8 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2d620 signed by 0 principal evaluation starts (used [false])
[4bc9 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2d620 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4bca 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2d620 principal evaluation succeeds for identity 0
[4bcb 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2d620 gate 1578074185445436000 evaluation succeeds
[4bcc 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4bcd 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4bce 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4bcf 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4bd0 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4bd1 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4bd2 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4bd3 01-03 17:56:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4bd4 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bd5 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bd6 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4bd7 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4bd8 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4bd9 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4bda 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4bdb 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4bdc 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4bdd 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4bde 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4bdf 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9e30 gate 1578074185456034500 evaluation starts
[4be0 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9e30 signed by 0 principal evaluation starts (used [false])
[4be1 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9e30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4be2 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4be3 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9e30 principal evaluation fails
[4be4 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9e30 gate 1578074185456034500 evaluation fails
[4be5 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4be6 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4be7 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4be8 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4be9 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4bea 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4beb 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4820 gate 1578074185457871700 evaluation starts
[4bec 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4820 signed by 0 principal evaluation starts (used [false])
[4bed 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4820 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4bee 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4820 principal evaluation succeeds for identity 0
[4bef 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4820 gate 1578074185457871700 evaluation succeeds
[4bf0 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4bf1 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4bf2 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4bf3 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4bf4 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bf5 01-03 17:56:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4bf6 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4bf7 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4bf8 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4bf9 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4bfa 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bfb 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bfc 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4bfd 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4bfe 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4bff 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c00 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c01 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c02 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4c03 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4c04 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c05 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b440 gate 1578074185469868100 evaluation starts
[4c06 01-03 17:56:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b440 signed by 0 principal evaluation starts (used [false])
[4c07 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b440 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4c08 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c09 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b440 principal evaluation fails
[4c0a 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b440 gate 1578074185469868100 evaluation fails
[4c0b 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4c0c 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c0d 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4c0e 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4c0f 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4c10 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c11 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bd40 gate 1578074185470886600 evaluation starts
[4c12 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bd40 signed by 0 principal evaluation starts (used [false])
[4c13 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bd40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4c14 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bd40 principal evaluation succeeds for identity 0
[4c15 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bd40 gate 1578074185470886600 evaluation succeeds
[4c16 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4c17 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4c18 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c19 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c1a 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c1b 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c1c 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4c1d 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4c1e 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4c1f 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c20 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c21 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c22 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4c23 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4c24 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c25 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033c9f0 gate 1578074185473624300 evaluation starts
[4c26 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033c9f0 signed by 0 principal evaluation starts (used [false])
[4c27 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033c9f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4c28 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033c9f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c29 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033c9f0 principal evaluation fails
[4c2a 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033c9f0 gate 1578074185473624300 evaluation fails
[4c2b 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4c2c 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c2d 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4c2e 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4c2f 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4c30 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c31 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033d560 gate 1578074185474041400 evaluation starts
[4c32 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033d560 signed by 0 principal evaluation starts (used [false])
[4c33 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033d560 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4c34 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033d560 principal evaluation succeeds for identity 0
[4c35 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033d560 gate 1578074185474041400 evaluation succeeds
[4c36 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4c37 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4c38 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c39 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c3a 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c3b 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4c3c 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c3d 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c3e 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c3f 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4c40 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4c41 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4c42 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c43 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c44 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c45 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4c46 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4c47 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c48 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7470 gate 1578074185474954800 evaluation starts
[4c49 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7470 signed by 0 principal evaluation starts (used [false])
[4c4a 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7470 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4c4b 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c4c 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7470 principal evaluation fails
[4c4d 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7470 gate 1578074185474954800 evaluation fails
[4c4e 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4c4f 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c50 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4c51 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4c52 01-03 17:56:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4c53 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c54 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7fd0 gate 1578074185494557300 evaluation starts
[4c55 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7fd0 signed by 0 principal evaluation starts (used [false])
[4c56 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7fd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4c57 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7fd0 principal evaluation succeeds for identity 0
[4c58 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7fd0 gate 1578074185494557300 evaluation succeeds
[4c59 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4c5a 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4c5b 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c5c 01-03 17:56:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c5d 01-03 17:56:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4c5e 01-03 17:56:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4c5f 01-03 17:56:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c60 01-03 17:56:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c61 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4c62 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4c63 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4c64 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c65 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c66 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c67 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4c68 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4c6a 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c69 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c6b 01-03 17:56:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d910 gate 1578074185529448700 evaluation starts
[4c6c 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c6d 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d910 signed by 0 principal evaluation starts (used [false])
[4c6e 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d910 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4c6f 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c70 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d910 principal evaluation fails
[4c71 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d910 gate 1578074185529448700 evaluation fails
[4c72 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4c74 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c75 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4c73 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4c76 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c77 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c78 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16974937110377634341 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[4c79 01-03 17:56:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16974937110377634341 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4c7a 01-03 17:56:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c7b 01-03 17:56:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4c7c 01-03 17:56:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4c7d 01-03 17:56:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c7e 01-03 17:56:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc210 gate 1578074185554180800 evaluation starts
[4c7f 01-03 17:56:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc210 signed by 0 principal evaluation starts (used [false])
[4c80 01-03 17:56:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc210 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4c81 01-03 17:56:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc210 principal evaluation succeeds for identity 0
[4c82 01-03 17:56:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc210 gate 1578074185554180800 evaluation succeeds
[4c83 01-03 17:56:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4c84 01-03 17:56:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4c85 01-03 17:56:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c86 01-03 17:56:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c87 01-03 17:56:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4c88 01-03 17:56:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4c89 01-03 17:56:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c8a 01-03 17:56:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16974937110377634341 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[4c8b 01-03 17:56:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16974937110377634341 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[4c8c 01-03 17:56:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c8d 01-03 17:56:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[4c8e 01-03 17:56:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c8f 01-03 17:56:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c90 01-03 17:56:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c91 01-03 17:56:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11902397302700645094 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4c92 01-03 17:56:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11902397302700645094 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4c93 01-03 17:56:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4c94 01-03 17:56:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c95 01-03 17:56:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[4c96 01-03 17:56:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[4c97 01-03 17:56:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c98 01-03 17:56:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c99 01-03 17:56:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c9a 01-03 17:56:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c9b 01-03 17:56:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[4c9c 01-03 17:56:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[4c9d 01-03 17:56:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c9e 01-03 17:56:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c9f 01-03 17:56:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ca0 01-03 17:56:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ca1 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[4ca2 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[4ca3 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510151801
[4ca4 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5CB798BEF8B14AF133F27D0E62F076E7E32D6B356A35912CB8C15E1DC63E43A
[4ca5 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[4ca6 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ca7 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ca8 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ca9 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4caa 01-03 17:56:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:21 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[4cab 01-03 17:56:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cac 01-03 17:56:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:21 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[4cad 01-03 17:56:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cae 01-03 17:56:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4caf 01-03 17:56:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4cb0 01-03 17:56:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cb1 01-03 17:56:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4cb2 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4cb3 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 0f dc 8a 15 fa 4d 47 02 ca fa 85 b8 d9 a0 7a |......MG.......z|
00000010 06 6a 2e bd 1d 27 0d b8 b9 dd dd f9 de 3f ed e0 |.j...'.......?..|
[4cb4 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff cd 61 5e 22 33 8f 41 43 9a ff |0E.!...a^"3.AC..|
00000010 c2 71 ed af 0a a0 25 ef 74 ad 12 19 30 9f 5e 69 |.q....%.t...0.^i|
00000020 bc 8a 06 75 44 02 20 4b 1b b0 2d c4 5b 07 a3 13 |...uD. K..-.[...|
00000030 44 f3 2f d6 71 9d 70 9c e2 1e cd ec bd 36 da 50 |D./.q.p......6.P|
00000040 55 19 74 68 4d da 50 |U.thM.P|
[4cb5 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4cb6 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b e7 58 1d 17 ba 9a 82 8c 9c bb 84 |0D. +.X.........|
00000010 2f 8c a2 cb 3e b5 16 9c 23 e1 4c 0f 88 75 ef fe |/...>...#.L..u..|
00000020 58 89 bb 8c 02 20 68 96 70 7b a3 b9 f1 d6 c8 1b |X.... h.p{......|
00000030 a2 09 86 c6 c7 c0 46 50 80 2a a0 35 38 d5 7b d7 |......FP.*.58.{.|
00000040 c6 c8 78 36 c9 e9 |..x6..|
[4cb7 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4cb8 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4cb9 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64
[4cba 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64
[4cbb 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4cbc 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cbd 01-03 17:56:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cbe 01-03 17:56:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cbf 01-03 17:56:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cc0 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cc1 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cc2 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4cc3 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cc4 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4cc5 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4cc6 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cc7 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4cc8 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cc9 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4cca 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4ccb 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ccc 01-03 17:56:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4ccd 01-03 17:56:26.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cce 01-03 17:56:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4ccf 01-03 17:56:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4cd0 01-03 17:56:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cd1 01-03 17:56:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4cd2 01-03 17:56:26.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cd3 01-03 17:56:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:7381489944318707319 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4cd4 01-03 17:56:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7381489944318707319 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4cd5 01-03 17:56:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4cd6 01-03 17:56:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cd7 01-03 17:56:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4cd8 01-03 17:56:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cd9 01-03 17:56:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4cda 01-03 17:56:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4cdb 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 cc 31 dd 35 6f c7 9c c7 73 ad 53 57 db 79 b8 |..1.5o...s.SW.y.|
00000010 4e f5 e7 ce 4b 00 f4 71 f1 99 0e 25 75 e6 51 44 |N...K..q...%u.QD|
[4cdc 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 78 9d 75 74 e2 4f d8 05 3f 38 |0E.!..x.ut.O..?8|
00000010 1d 83 07 0d 1f 51 8e 02 c0 97 62 e1 c2 9c 4a 0e |.....Q....b...J.|
00000020 7a 51 b4 57 80 02 20 79 67 1f 6a d5 45 e3 7e b2 |zQ.W.. yg.j.E.~.|
00000030 95 44 69 93 31 51 8c 80 99 52 12 7d 35 34 92 1e |.Di.1Q...R.}54..|
00000040 96 49 e3 44 a1 7f df |.I.D...|
[4cdd 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4cde 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 2c d9 b4 4b 0d e0 c5 0b 9a 84 80 |0D. Q,..K.......|
00000010 62 bc a0 f7 05 44 7c 33 ce 1d dd d2 57 e7 89 3a |b....D|3....W..:|
00000020 df 2c e9 22 02 20 17 71 df 15 04 61 b2 3f d2 e0 |.,.". .q...a.?..|
00000030 cb 1d 3d ee 29 19 88 55 da c7 ba 61 e1 9c 33 6b |..=.)..U...a..3k|
00000040 72 00 cb 7e 1d 9b |r..~..|
[4cdf 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4ce0 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4ce1 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65
[4ce2 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65
[4ce3 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4ce4 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ce5 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ce6 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ce7 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4ce8 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ce9 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cea 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[4ceb 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[4cec 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[4ced 01-03 17:56:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4cee 01-03 17:56:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4cef 01-03 17:56:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cf0 01-03 17:56:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4cf1 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4cf2 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cf3 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4cf4 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4cf5 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4cf6 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4cf7 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4cf8 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4cf9 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 0f 10 8e b1 43 b2 64 6f 5e 51 39 0c cf 47 25 |{....C.do^Q9..G%|
00000010 9e 82 ea 93 b7 43 03 dd 3f 56 4d ff 29 d4 1d 14 |.....C..?VM.)...|
[4cfa 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 65 6c 90 cd 46 70 86 5d aa b6 |0E.!..el..Fp.]..|
00000010 53 19 48 f2 f5 84 13 83 a0 a9 c9 31 e1 ea 3e cf |S.H........1..>.|
00000020 84 ce 51 b8 66 02 20 6a dc 03 e5 7d 71 cf cf 9c |..Q.f. j...}q...|
00000030 60 89 69 c9 ad c3 0c 28 57 42 74 9c 22 60 97 4d |`.i....(WBt."`.M|
00000040 d5 fb fc 71 f3 fd c5 |...q...|
[4cfb 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4cfc 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278310 gate 1578074187991950700 evaluation starts
[4cfd 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278310 signed by 0 principal evaluation starts (used [false])
[4cfe 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278310 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4cff 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4d00 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278310 principal evaluation fails
[4d01 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278310 gate 1578074187991950700 evaluation fails
[4d02 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4d03 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4d04 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4d05 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 0f 10 8e b1 43 b2 64 6f 5e 51 39 0c cf 47 25 |{....C.do^Q9..G%|
00000010 9e 82 ea 93 b7 43 03 dd 3f 56 4d ff 29 d4 1d 14 |.....C..?VM.)...|
[4d06 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 65 6c 90 cd 46 70 86 5d aa b6 |0E.!..el..Fp.]..|
00000010 53 19 48 f2 f5 84 13 83 a0 a9 c9 31 e1 ea 3e cf |S.H........1..>.|
00000020 84 ce 51 b8 66 02 20 6a dc 03 e5 7d 71 cf cf 9c |..Q.f. j...}q...|
00000030 60 89 69 c9 ad c3 0c 28 57 42 74 9c 22 60 97 4d |`.i....(WBt."`.M|
00000040 d5 fb fc 71 f3 fd c5 |...q...|
[4d07 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4d08 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278c80 gate 1578074187992402600 evaluation starts
[4d09 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278c80 signed by 0 principal evaluation starts (used [false])
[4d0a 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278c80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4d0b 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278c80 principal evaluation succeeds for identity 0
[4d0c 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278c80 gate 1578074187992402600 evaluation succeeds
[4d0d 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4d0e 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4d0f 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4d10 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4d11 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4d12 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes]}
[4d13 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62
[4d14 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62
[4d15 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4d16 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d17 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d18 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d19 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4d1a 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4d1b 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d1c 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4d1d 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d1e 01-03 17:56:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d1f 01-03 17:56:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d20 01-03 17:56:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d21 01-03 17:56:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d22 01-03 17:56:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d23 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d24 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d25 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d26 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4d27 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d28 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d29 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d2a 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d2b 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4d2c 01-03 17:56:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d2d 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d2e 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d2f 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d30 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d31 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4d32 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d33 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4d34 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4d35 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4d36 01-03 17:56:28.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4d37 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4d38 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4d39 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 95 00 e8 10 0f ae 55 a1 09 17 4a 3f e0 de fe |.......U...J?...|
00000010 bb 55 ea fa e3 68 79 b3 37 e9 66 75 70 28 28 cc |.U...hy.7.fup((.|
[4d3a 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 44 cc 9b f6 5a 82 b3 a5 4f 74 |0E.!..D...Z...Ot|
00000010 64 55 55 2f 18 8d 26 29 2a 21 e1 3d ed 89 98 fc |dUU/..&)*!.=....|
00000020 db b3 3a bc 47 02 20 44 63 70 70 5a 0b c5 af ff |..:.G. DcppZ....|
00000030 49 62 34 77 a1 07 66 82 a5 16 ed 79 6b 1d 4b 2d |Ib4w..f....yk.K-|
00000040 66 7b 92 05 a1 58 63 |f{...Xc|
[4d3b 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4d3c 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030bf20 gate 1578074188075621100 evaluation starts
[4d3d 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030bf20 signed by 0 principal evaluation starts (used [false])
[4d3e 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030bf20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4d3f 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030bf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4d40 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030bf20 principal evaluation fails
[4d41 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030bf20 gate 1578074188075621100 evaluation fails
[4d42 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4d43 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4d44 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4d45 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 95 00 e8 10 0f ae 55 a1 09 17 4a 3f e0 de fe |.......U...J?...|
00000010 bb 55 ea fa e3 68 79 b3 37 e9 66 75 70 28 28 cc |.U...hy.7.fup((.|
[4d46 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 44 cc 9b f6 5a 82 b3 a5 4f 74 |0E.!..D...Z...Ot|
00000010 64 55 55 2f 18 8d 26 29 2a 21 e1 3d ed 89 98 fc |dUU/..&)*!.=....|
00000020 db b3 3a bc 47 02 20 44 63 70 70 5a 0b c5 af ff |..:.G. DcppZ....|
00000030 49 62 34 77 a1 07 66 82 a5 16 ed 79 6b 1d 4b 2d |Ib4w..f....yk.K-|
00000040 66 7b 92 05 a1 58 63 |f{...Xc|
[4d47 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4d48 01-03 17:56:28.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035c820 gate 1578074188079735400 evaluation starts
[4d49 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035c820 signed by 0 principal evaluation starts (used [false])
[4d4a 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035c820 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4d4b 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035c820 principal evaluation succeeds for identity 0
[4d4c 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035c820 gate 1578074188079735400 evaluation succeeds
[4d4d 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4d4e 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4d4f 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4d50 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4d51 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d52 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes]}
[4d53 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64
[4d54 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64
[4d55 01-03 17:56:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4d56 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d57 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d58 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d59 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d5a 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d5b 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d5c 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d5d 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d5e 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d5f 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d60 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d61 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d62 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d63 01-03 17:56:28.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d64 01-03 17:56:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d65 01-03 17:56:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d66 01-03 17:56:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d67 01-03 17:56:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d68 01-03 17:56:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d69 01-03 17:56:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d6a 01-03 17:56:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d6b 01-03 17:56:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d6c 01-03 17:56:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4d6d 01-03 17:56:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d6e 01-03 17:56:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4d6f 01-03 17:56:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d70 01-03 17:56:28.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d71 01-03 17:56:28.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d72 01-03 17:56:28.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d73 01-03 17:56:28.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d74 01-03 17:56:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315103D
[4d75 01-03 17:56:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 96D8F6DEF73BEE52EA90D077FE5224F6E99527A4E648500A24AB97E00C5B5D0A
[4d76 01-03 17:56:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4d77 01-03 17:56:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4d78 01-03 17:56:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[4d79 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d7a 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d7b 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d7c 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d7d 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[4d7e 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d7f 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d80 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4d81 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d82 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4d83 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d84 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4d85 01-03 17:56:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d86 01-03 17:56:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:7731751464201237102 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4d87 01-03 17:56:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:7731751464201237102 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4d88 01-03 17:56:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7731751464201237102 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4d89 01-03 17:56:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d8a 01-03 17:56:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d8b 01-03 17:56:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d8c 01-03 17:56:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d8d 01-03 17:56:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d8e 01-03 17:56:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d8f 01-03 17:56:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[4d90 01-03 17:56:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d91 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:865613455649939378 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4d92 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:865613455649939378 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4d93 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:865613455649939378 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4d94 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d95 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d96 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d97 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d98 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d99 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d9a 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[4d9b 01-03 17:56:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d9c 01-03 17:56:29.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4d9d 01-03 17:56:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4d9e 01-03 17:56:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d9f 01-03 17:56:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4da0 01-03 17:56:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4da2 01-03 17:56:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4da3 01-03 17:56:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4da4 01-03 17:56:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4da1 01-03 17:56:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4da5 01-03 17:56:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4da6 01-03 17:56:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4da7 01-03 17:56:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4da8 01-03 17:56:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4da9 01-03 17:56:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4daa 01-03 17:56:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c a6 40 0b fd 28 7b 76 75 ed 92 08 8f 18 c1 9b ||.@..({vu.......|
00000010 c9 8a c6 8f 9b 73 23 6c 1a 6f 10 60 06 3d fe c7 |.....s#l.o.`.=..|
[4dab 01-03 17:56:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 01 78 91 92 70 ba a4 8b 6a 34 60 |0D. Z.x..p...j4`|
00000010 fa d2 cd 38 2d bd 56 07 d2 75 c6 3a 97 7c b6 5d |...8-.V..u.:.|.]|
00000020 a4 cf 75 a7 02 20 29 41 8c 0b 61 3c 94 01 fc e1 |..u.. )A..a<....|
00000030 b6 7d 09 4e 5a 53 29 31 66 a3 e2 3b 8c 2c f4 d0 |.}.NZS)1f..;.,..|
00000040 bd b0 32 e2 87 0c |..2...|
[4dac 01-03 17:56:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4dad 01-03 17:56:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca90 gate 1578074189218022000 evaluation starts
[4dae 01-03 17:56:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca90 signed by 0 principal evaluation starts (used [false])
[4daf 01-03 17:56:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4db0 01-03 17:56:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4db1 01-03 17:56:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca90 principal evaluation fails
[4db2 01-03 17:56:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca90 gate 1578074189218022000 evaluation fails
[4db3 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4db4 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4db5 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4db6 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c a6 40 0b fd 28 7b 76 75 ed 92 08 8f 18 c1 9b ||.@..({vu.......|
00000010 c9 8a c6 8f 9b 73 23 6c 1a 6f 10 60 06 3d fe c7 |.....s#l.o.`.=..|
[4db7 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 01 78 91 92 70 ba a4 8b 6a 34 60 |0D. Z.x..p...j4`|
00000010 fa d2 cd 38 2d bd 56 07 d2 75 c6 3a 97 7c b6 5d |...8-.V..u.:.|.]|
00000020 a4 cf 75 a7 02 20 29 41 8c 0b 61 3c 94 01 fc e1 |..u.. )A..a<....|
00000030 b6 7d 09 4e 5a 53 29 31 66 a3 e2 3b 8c 2c f4 d0 |.}.NZS)1f..;.,..|
00000040 bd b0 32 e2 87 0c |..2...|
[4db8 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4db9 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d3c0 gate 1578074189228848500 evaluation starts
[4dba 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d3c0 signed by 0 principal evaluation starts (used [false])
[4dbb 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d3c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4dbc 01-03 17:56:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d3c0 principal evaluation succeeds for identity 0
[4dbd 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d3c0 gate 1578074189228848500 evaluation succeeds
[4dbe 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4dbf 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4dc0 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4dc1 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4dc2 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[4dc3 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes]}
[4dc4 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65
[4dc5 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65
[4dc6 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4dc7 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dc8 01-03 17:56:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dc9 01-03 17:56:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[4dca 01-03 17:56:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13939527254664875337 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4dcb 01-03 17:56:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4dcc 01-03 17:56:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12722621263174822489 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4dcd 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[4dce 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6273808145813627431 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4dcf 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6273808145813627431 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4dd0 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dd1 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13939527254664875337 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4dd2 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dd3 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12722621263174822489 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4dd4 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dd5 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6273808145813627431 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[4dd6 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dd7 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4dd8 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4dd9 01-03 17:56:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dda 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4ddb 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4ddc 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4ddd 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4dde 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4ddf 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4de0 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 00 99 36 25 c7 bf b1 76 ab c8 ce 42 03 47 72 |_..6%...v...B.Gr|
00000010 5c 28 07 32 2d 53 e6 fd 93 1d 30 08 d2 c2 0e d7 |\(.2-S....0.....|
[4de1 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 01 8a d7 a5 48 a8 b8 19 09 de |0E.!......H.....|
00000010 ff 9e 42 43 48 0f 37 b5 92 23 a7 35 5d 51 6c 74 |..BCH.7..#.5]Qlt|
00000020 0c 9d 72 15 57 02 20 04 a8 a4 fe f6 12 80 79 6c |..r.W. .......yl|
00000030 ef f1 2c cc 7d 9f 38 d6 75 57 44 10 4a 89 bb c1 |..,.}.8.uWD.J...|
00000040 3b c4 7a 79 a1 80 f1 |;.zy...|
[4de2 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4de3 01-03 17:56:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b90640 gate 1578074189288734200 evaluation starts
[4de4 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b90640 signed by 0 principal evaluation starts (used [false])
[4de5 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b90640 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4de6 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b90640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4de7 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b90640 principal evaluation fails
[4de8 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b90640 gate 1578074189288734200 evaluation fails
[4de9 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4dea 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4deb 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4dec 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 00 99 36 25 c7 bf b1 76 ab c8 ce 42 03 47 72 |_..6%...v...B.Gr|
00000010 5c 28 07 32 2d 53 e6 fd 93 1d 30 08 d2 c2 0e d7 |\(.2-S....0.....|
[4ded 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 01 8a d7 a5 48 a8 b8 19 09 de |0E.!......H.....|
00000010 ff 9e 42 43 48 0f 37 b5 92 23 a7 35 5d 51 6c 74 |..BCH.7..#.5]Qlt|
00000020 0c 9d 72 15 57 02 20 04 a8 a4 fe f6 12 80 79 6c |..r.W. .......yl|
00000030 ef f1 2c cc 7d 9f 38 d6 75 57 44 10 4a 89 bb c1 |..,.}.8.uWD.J...|
00000040 3b c4 7a 79 a1 80 f1 |;.zy...|
[4dee 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4def 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b91120 gate 1578074189291698700 evaluation starts
[4df0 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b91120 signed by 0 principal evaluation starts (used [false])
[4df1 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b91120 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4df2 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b91120 principal evaluation succeeds for identity 0
[4df3 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b91120 gate 1578074189291698700 evaluation succeeds
[4df4 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4df5 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4df6 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4df7 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4df8 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[4df9 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes]}
[4dfa 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63
[4dfb 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63
[4dfc 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4dfd 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dfe 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dff 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e00 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[4e01 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e02 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e03 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e04 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[4e05 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4e06 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4e07 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e08 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[4e09 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e0a 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e0b 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e0c 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[4e0d 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4e0e 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4e0f 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e10 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e11 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6273808145813627431 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[4e12 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6273808145813627431 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[4e13 01-03 17:56:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e14 01-03 17:56:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12722621263174822489 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[4e15 01-03 17:56:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12722621263174822489 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[4e16 01-03 17:56:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12722621263174822489 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[4e17 01-03 17:56:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e18 01-03 17:56:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13939527254664875337 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[4e19 01-03 17:56:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13939527254664875337 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[4e1a 01-03 17:56:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e1b 01-03 17:56:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315103E
[4e1c 01-03 17:56:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1520B67178B26CF8E2CBFD1B15CF0E5FFE9B5FB89B7BA888180306235F734D83
[4e1d 01-03 17:56:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4e1e 01-03 17:56:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4e1f 01-03 17:56:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e20 01-03 17:56:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[4e21 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[4e22 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e24 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[4e25 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e26 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[4e27 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4e28 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e23 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4e29 01-03 17:56:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e2a 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[4e2b 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e2c 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[4e2d 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4e2e 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 20 b6 71 78 b2 6c f8 e2 cb fd 1b 15 cf 0e 5f |. .qx.l........_|
00000010 fe 9b 5f b8 9b 7b a8 88 18 03 06 23 5f 73 4d 83 |.._..{.....#_sM.|
[4e2f 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 7e 8b 12 96 67 3d 26 dc 52 96 |0E.!..~...g=&.R.|
00000010 aa a3 82 83 07 71 f3 08 e6 bc 77 65 95 5a 81 25 |.....q....we.Z.%|
00000020 98 a3 1c 08 c1 02 20 18 56 1d a9 0e a7 04 2e 9d |...... .V.......|
00000030 b1 c9 9f 16 ab e8 1b ed 53 63 74 a0 e4 c2 97 46 |........Sct....F|
00000040 2c ce d5 c4 3e 93 4f |,...>.O|
[4e30 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[4e31 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 14 d5 73 22 ef 61 98 07 4f 08 |0E.!....s".a..O.|
00000010 b9 a6 09 60 90 cb d1 56 0d 9b 34 f4 82 ca 3d 20 |...`...V..4...= |
00000020 a3 38 97 df bc 02 20 6a 54 1c 35 6e ba 72 b1 ad |.8.... jT.5n.r..|
00000030 d9 56 52 d1 9d d0 d1 68 02 08 ab 86 1a 15 54 fe |.VR....h......T.|
00000040 80 5f ad 88 57 a2 3b |._..W.;|
[4e32 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4e33 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4e34 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e35 01-03 17:56:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e36 01-03 17:56:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4e37 01-03 17:56:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4e38 01-03 17:56:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e39 01-03 17:56:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4e3a 01-03 17:56:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[4e3b 01-03 17:56:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e3c 01-03 17:56:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4e3d 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4e3e 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4e3f 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4e40 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4e41 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4e42 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c a6 40 0b fd 28 7b 76 75 ed 92 08 8f 18 c1 9b ||.@..({vu.......|
00000010 c9 8a c6 8f 9b 73 23 6c 1a 6f 10 60 06 3d fe c7 |.....s#l.o.`.=..|
[4e43 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 01 78 91 92 70 ba a4 8b 6a 34 60 |0D. Z.x..p...j4`|
00000010 fa d2 cd 38 2d bd 56 07 d2 75 c6 3a 97 7c b6 5d |...8-.V..u.:.|.]|
00000020 a4 cf 75 a7 02 20 29 41 8c 0b 61 3c 94 01 fc e1 |..u.. )A..a<....|
00000030 b6 7d 09 4e 5a 53 29 31 66 a3 e2 3b 8c 2c f4 d0 |.}.NZS)1f..;.,..|
00000040 bd b0 32 e2 87 0c |..2...|
[4e44 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4e45 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d130d0 gate 1578074189394061400 evaluation starts
[4e46 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d130d0 signed by 0 principal evaluation starts (used [false])
[4e47 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d130d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4e48 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d130d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4e49 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d130d0 principal evaluation fails
[4e4a 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d130d0 gate 1578074189394061400 evaluation fails
[4e4b 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4e4c 01-03 17:56:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4e4d 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4e4e 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c a6 40 0b fd 28 7b 76 75 ed 92 08 8f 18 c1 9b ||.@..({vu.......|
00000010 c9 8a c6 8f 9b 73 23 6c 1a 6f 10 60 06 3d fe c7 |.....s#l.o.`.=..|
[4e4f 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 01 78 91 92 70 ba a4 8b 6a 34 60 |0D. Z.x..p...j4`|
00000010 fa d2 cd 38 2d bd 56 07 d2 75 c6 3a 97 7c b6 5d |...8-.V..u.:.|.]|
00000020 a4 cf 75 a7 02 20 29 41 8c 0b 61 3c 94 01 fc e1 |..u.. )A..a<....|
00000030 b6 7d 09 4e 5a 53 29 31 66 a3 e2 3b 8c 2c f4 d0 |.}.NZS)1f..;.,..|
00000040 bd b0 32 e2 87 0c |..2...|
[4e50 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4e51 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13c10 gate 1578074189401967300 evaluation starts
[4e52 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13c10 signed by 0 principal evaluation starts (used [false])
[4e53 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13c10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4e54 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13c10 principal evaluation succeeds for identity 0
[4e55 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d13c10 gate 1578074189401967300 evaluation succeeds
[4e56 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4e57 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4e58 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4e59 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4e5a 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[4e5b 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e5c 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4e5d 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 cc 31 dd 35 6f c7 9c c7 73 ad 53 57 db 79 b8 |..1.5o...s.SW.y.|
00000010 4e f5 e7 ce 4b 00 f4 71 f1 99 0e 25 75 e6 51 44 |N...K..q...%u.QD|
[4e5e 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 78 9d 75 74 e2 4f d8 05 3f 38 |0E.!..x.ut.O..?8|
00000010 1d 83 07 0d 1f 51 8e 02 c0 97 62 e1 c2 9c 4a 0e |.....Q....b...J.|
00000020 7a 51 b4 57 80 02 20 79 67 1f 6a d5 45 e3 7e b2 |zQ.W.. yg.j.E.~.|
00000030 95 44 69 93 31 51 8c 80 99 52 12 7d 35 34 92 1e |.Di.1Q...R.}54..|
00000040 96 49 e3 44 a1 7f df |.I.D...|
[4e5f 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4e60 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e61 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4e62 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 20 b6 71 78 b2 6c f8 e2 cb fd 1b 15 cf 0e 5f |. .qx.l........_|
00000010 fe 9b 5f b8 9b 7b a8 88 18 03 06 23 5f 73 4d 83 |.._..{.....#_sM.|
[4e63 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 7e 8b 12 96 67 3d 26 dc 52 96 |0E.!..~...g=&.R.|
00000010 aa a3 82 83 07 71 f3 08 e6 bc 77 65 95 5a 81 25 |.....q....we.Z.%|
00000020 98 a3 1c 08 c1 02 20 18 56 1d a9 0e a7 04 2e 9d |...... .V.......|
00000030 b1 c9 9f 16 ab e8 1b ed 53 63 74 a0 e4 c2 97 46 |........Sct....F|
00000040 2c ce d5 c4 3e 93 4f |,...>.O|
[4e64 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4e65 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e66 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e67 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[4e68 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[4e69 01-03 17:56:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e6a 01-03 17:56:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[4e6b 01-03 17:56:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e6c 01-03 17:56:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[4e6d 01-03 17:56:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e6e 01-03 17:56:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4e6f 01-03 17:56:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e70 01-03 17:56:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e71 01-03 17:56:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4e73 01-03 17:56:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4e74 01-03 17:56:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4e72 01-03 17:56:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4e75 01-03 17:56:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4e76 01-03 17:56:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4e77 01-03 17:56:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4e78 01-03 17:56:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4e79 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e7a 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e7b 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4e7c 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4e7d 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4e7e 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4e7f 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4e80 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4e81 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4e82 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4e83 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4e84 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e106c0 gate 1578074189437306800 evaluation starts
[4e85 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e106c0 signed by 0 principal evaluation starts (used [false])
[4e86 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e106c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4e87 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e106c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4e88 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e106c0 principal evaluation fails
[4e89 01-03 17:56:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e106c0 gate 1578074189437306800 evaluation fails
[4e8a 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4e8b 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4e8c 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4e8d 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4e8e 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4e8f 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4e90 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10fc0 gate 1578074189442433700 evaluation starts
[4e91 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10fc0 signed by 0 principal evaluation starts (used [false])
[4e92 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10fc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4e93 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10fc0 principal evaluation succeeds for identity 0
[4e94 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10fc0 gate 1578074189442433700 evaluation succeeds
[4e95 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4e96 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4e97 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4e98 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4e99 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e9a 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e9b 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4e9c 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4e9d 01-03 17:56:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4e9e 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4e9f 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4ea0 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4ea1 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4ea2 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4ea3 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ea4 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cae0 gate 1578074189451061800 evaluation starts
[4ea5 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cae0 signed by 0 principal evaluation starts (used [false])
[4ea6 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cae0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4ea7 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4ea8 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cae0 principal evaluation fails
[4ea9 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3cae0 gate 1578074189451061800 evaluation fails
[4eaa 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4eab 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4eac 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4ead 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4eae 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4eaf 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4eb0 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3d3e0 gate 1578074189453258700 evaluation starts
[4eb1 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3d3e0 signed by 0 principal evaluation starts (used [false])
[4eb2 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3d3e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4eb3 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3d3e0 principal evaluation succeeds for identity 0
[4eb4 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e3d3e0 gate 1578074189453258700 evaluation succeeds
[4eb5 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4eb6 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4eb7 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4eb8 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4eb9 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4eba 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4ebb 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ebc 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ebd 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ebe 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4ebf 01-03 17:56:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4ec0 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4ec1 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4ec2 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4ec3 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4ec4 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4ec5 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4ec6 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ec7 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc90f0 gate 1578074189462753500 evaluation starts
[4ec8 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc90f0 signed by 0 principal evaluation starts (used [false])
[4ec9 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc90f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4eca 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc90f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4ecb 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc90f0 principal evaluation fails
[4ecc 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc90f0 gate 1578074189462753500 evaluation fails
[4ecd 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4ece 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4ecf 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4ed0 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4ed1 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4ed2 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ed3 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc99f0 gate 1578074189466558000 evaluation starts
[4ed4 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc99f0 signed by 0 principal evaluation starts (used [false])
[4ed5 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc99f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4ed6 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc99f0 principal evaluation succeeds for identity 0
[4ed7 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc99f0 gate 1578074189466558000 evaluation succeeds
[4ed8 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4ed9 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4eda 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4edb 01-03 17:56:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4edc 01-03 17:56:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4edd 01-03 17:56:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4ede 01-03 17:56:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4edf 01-03 17:56:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4ee0 01-03 17:56:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ee1 01-03 17:56:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ee2 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4ee3 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4ee4 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4ee5 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4ee6 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4ee7 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4ee8 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4ee9 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4eea 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4eeb 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002300 gate 1578074189482814900 evaluation starts
[4eec 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002300 signed by 0 principal evaluation starts (used [false])
[4eed 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002300 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4eee 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4eef 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002300 principal evaluation fails
[4ef0 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002300 gate 1578074189482814900 evaluation fails
[4ef1 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4ef2 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4ef3 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4ef4 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4ef5 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4ef6 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ef7 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002c00 gate 1578074189488834500 evaluation starts
[4ef8 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002c00 signed by 0 principal evaluation starts (used [false])
[4ef9 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002c00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4efa 01-03 17:56:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002c00 principal evaluation succeeds for identity 0
[4efb 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003002c00 gate 1578074189488834500 evaluation succeeds
[4efc 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4efd 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4efe 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4eff 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4f00 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f01 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4f02 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f03 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[4f04 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4f05 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f06 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4f07 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4f08 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4f09 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4f0a 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4f0b 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4f0c 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 00 99 36 25 c7 bf b1 76 ab c8 ce 42 03 47 72 |_..6%...v...B.Gr|
00000010 5c 28 07 32 2d 53 e6 fd 93 1d 30 08 d2 c2 0e d7 |\(.2-S....0.....|
[4f0d 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 01 8a d7 a5 48 a8 b8 19 09 de |0E.!......H.....|
00000010 ff 9e 42 43 48 0f 37 b5 92 23 a7 35 5d 51 6c 74 |..BCH.7..#.5]Qlt|
00000020 0c 9d 72 15 57 02 20 04 a8 a4 fe f6 12 80 79 6c |..r.W. .......yl|
00000030 ef f1 2c cc 7d 9f 38 d6 75 57 44 10 4a 89 bb c1 |..,.}.8.uWD.J...|
00000040 3b c4 7a 79 a1 80 f1 |;.zy...|
[4f0e 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f0f 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d060 gate 1578074189494528100 evaluation starts
[4f10 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d060 signed by 0 principal evaluation starts (used [false])
[4f11 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d060 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4f12 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4f13 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d060 principal evaluation fails
[4f14 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d060 gate 1578074189494528100 evaluation fails
[4f15 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4f16 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4f17 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4f18 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 00 99 36 25 c7 bf b1 76 ab c8 ce 42 03 47 72 |_..6%...v...B.Gr|
00000010 5c 28 07 32 2d 53 e6 fd 93 1d 30 08 d2 c2 0e d7 |\(.2-S....0.....|
[4f19 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 01 8a d7 a5 48 a8 b8 19 09 de |0E.!......H.....|
00000010 ff 9e 42 43 48 0f 37 b5 92 23 a7 35 5d 51 6c 74 |..BCH.7..#.5]Qlt|
00000020 0c 9d 72 15 57 02 20 04 a8 a4 fe f6 12 80 79 6c |..r.W. .......yl|
00000030 ef f1 2c cc 7d 9f 38 d6 75 57 44 10 4a 89 bb c1 |..,.}.8.uWD.J...|
00000040 3b c4 7a 79 a1 80 f1 |;.zy...|
[4f1a 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f1b 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d960 gate 1578074189496201900 evaluation starts
[4f1c 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d960 signed by 0 principal evaluation starts (used [false])
[4f1d 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d960 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4f1e 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d960 principal evaluation succeeds for identity 0
[4f1f 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303d960 gate 1578074189496201900 evaluation succeeds
[4f20 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4f21 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4f22 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4f23 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4f24 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[4f25 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f26 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[4f27 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 20 b6 71 78 b2 6c f8 e2 cb fd 1b 15 cf 0e 5f |. .qx.l........_|
00000010 fe 9b 5f b8 9b 7b a8 88 18 03 06 23 5f 73 4d 83 |.._..{.....#_sM.|
[4f28 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 7e 8b 12 96 67 3d 26 dc 52 96 |0E.!..~...g=&.R.|
00000010 aa a3 82 83 07 71 f3 08 e6 bc 77 65 95 5a 81 25 |.....q....we.Z.%|
00000020 98 a3 1c 08 c1 02 20 18 56 1d a9 0e a7 04 2e 9d |...... .V.......|
00000030 b1 c9 9f 16 ab e8 1b ed 53 63 74 a0 e4 c2 97 46 |........Sct....F|
00000040 2c ce d5 c4 3e 93 4f |,...>.O|
[4f29 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4f2a 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4f2b 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f2c 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4f2d 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 cc 31 dd 35 6f c7 9c c7 73 ad 53 57 db 79 b8 |..1.5o...s.SW.y.|
00000010 4e f5 e7 ce 4b 00 f4 71 f1 99 0e 25 75 e6 51 44 |N...K..q...%u.QD|
[4f2e 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 78 9d 75 74 e2 4f d8 05 3f 38 |0E.!..x.ut.O..?8|
00000010 1d 83 07 0d 1f 51 8e 02 c0 97 62 e1 c2 9c 4a 0e |.....Q....b...J.|
00000020 7a 51 b4 57 80 02 20 79 67 1f 6a d5 45 e3 7e b2 |zQ.W.. yg.j.E.~.|
00000030 95 44 69 93 31 51 8c 80 99 52 12 7d 35 34 92 1e |.Di.1Q...R.}54..|
00000040 96 49 e3 44 a1 7f df |.I.D...|
[4f2f 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4f30 01-03 17:56:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f31 01-03 17:56:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f32 01-03 17:56:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[4f33 01-03 17:56:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f34 01-03 17:56:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f35 01-03 17:56:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f36 01-03 17:56:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4f37 01-03 17:56:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4f38 01-03 17:56:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4f39 01-03 17:56:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4f3a 01-03 17:56:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4f3b 01-03 17:56:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4f3c 01-03 17:56:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4f3d 01-03 17:56:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4f3e 01-03 17:56:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f3f 01-03 17:56:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104bc0 gate 1578074189519742800 evaluation starts
[4f40 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104bc0 signed by 0 principal evaluation starts (used [false])
[4f41 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104bc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4f42 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4f43 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104bc0 principal evaluation fails
[4f44 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104bc0 gate 1578074189519742800 evaluation fails
[4f45 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4f46 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4f47 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4f48 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[4f49 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[4f4a 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f4b 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003105500 gate 1578074189525031700 evaluation starts
[4f4c 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003105500 signed by 0 principal evaluation starts (used [false])
[4f4d 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003105500 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[4f4e 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003105500 principal evaluation succeeds for identity 0
[4f4f 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003105500 gate 1578074189525031700 evaluation succeeds
[4f50 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4f51 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4f52 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4f53 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4f54 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[4f55 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[4f56 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f57 01-03 17:56:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f58 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4f59 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4f5a 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4f5b 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4f5c 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4f5d 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4f5e 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4f5f 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4f60 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f61 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d870 gate 1578074189535485100 evaluation starts
[4f62 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f63 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f64 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4f65 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f66 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f67 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9606524278588223732 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[4f68 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9606524278588223732 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4f69 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f6a 01-03 17:56:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d870 signed by 0 principal evaluation starts (used [false])
[4f6b 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d870 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4f6c 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4f6d 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d870 principal evaluation fails
[4f6e 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d870 gate 1578074189535485100 evaluation fails
[4f6f 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4f70 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4f71 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4f72 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[4f73 01-03 17:56:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[4f74 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f75 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e180 gate 1578074189556241700 evaluation starts
[4f76 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e180 signed by 0 principal evaluation starts (used [false])
[4f77 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e180 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4f78 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e180 principal evaluation succeeds for identity 0
[4f79 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e180 gate 1578074189556241700 evaluation succeeds
[4f7a 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4f7b 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4f7c 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4f7d 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4f7e 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[4f7f 01-03 17:56:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[4f80 01-03 17:56:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f81 01-03 17:56:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9606524278588223732 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[4f82 01-03 17:56:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9606524278588223732 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[4f83 01-03 17:56:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f84 01-03 17:56:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[4f85 01-03 17:56:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f86 01-03 17:56:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f87 01-03 17:56:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f88 01-03 17:56:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8385887780285951128 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4f89 01-03 17:56:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8385887780285951128 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4f8a 01-03 17:56:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4f8b 01-03 17:56:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f8c 01-03 17:56:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[4f8d 01-03 17:56:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[4f8e 01-03 17:56:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f8f 01-03 17:56:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f90 01-03 17:56:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f91 01-03 17:56:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f92 01-03 17:56:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[4f93 01-03 17:56:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[4f94 01-03 17:56:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f95 01-03 17:56:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f96 01-03 17:56:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f97 01-03 17:56:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f98 01-03 17:56:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[4f99 01-03 17:56:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[4f9a 01-03 17:56:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510161801
[4f9b 01-03 17:56:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DB26A0C3B374183869DC4199A16F8CD2FB84B4D334760989DE441F6552576666
[4f9c 01-03 17:56:31.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[4f9d 01-03 17:56:31.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f9e 01-03 17:56:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f9f 01-03 17:56:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fa0 01-03 17:56:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fa1 01-03 17:56:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:22 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[4fa2 01-03 17:56:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fa3 01-03 17:56:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fa4 01-03 17:56:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:22 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[4fa5 01-03 17:56:31.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fa6 01-03 17:56:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4fa7 01-03 17:56:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fa8 01-03 17:56:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4fa9 01-03 17:56:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4faa 01-03 17:56:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 31 83 7d e5 67 bb c6 7d 45 ee c8 c4 a6 9f ab |.1.}.g..}E......|
00000010 26 e7 03 e5 c7 d0 dc fa 75 e9 7f 1b f1 16 41 42 |&.......u.....AB|
[4fab 01-03 17:56:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 3c ec 10 fd b3 62 40 a9 cf 10 |0E.!..<....b@...|
00000010 24 eb 2c fa 21 29 35 59 09 ed 6c 80 1d 56 4a ef |$.,.!)5Y..l..VJ.|
00000020 bd 4f ce ca f3 02 20 63 44 6e ec 37 69 0b c7 b0 |.O.... cDn.7i...|
00000030 6e 72 7c 12 ee 12 a1 ff b9 a0 f3 34 b8 ea 4c 5e |nr|........4..L^|
00000040 8a d0 91 6c 2e 1b 83 |...l...|
[4fac 01-03 17:56:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4fad 01-03 17:56:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 33 c9 4d dd 16 15 25 1f 84 a3 |0E.!..3.M...%...|
00000010 9a 18 41 5e 6c 82 26 ea e6 cd aa 4b 23 00 7d ed |..A^l.&....K#.}.|
00000020 05 ba e2 d9 4f 02 20 6c 1c c3 77 b2 05 9f 7d fb |....O. l..w...}.|
00000030 5d 90 21 44 8b f3 68 eb c7 e8 79 ac 0f 70 96 5c |].!D..h...y..p.\|
00000040 c0 9b 5d 27 35 32 4d |..]'52M|
[4fae 01-03 17:56:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4faf 01-03 17:56:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[4fb0 01-03 17:56:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66
[4fb1 01-03 17:56:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66
[4fb2 01-03 17:56:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4fb3 01-03 17:56:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fb4 01-03 17:56:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fb5 01-03 17:56:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fb6 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fb7 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4fb8 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4fb9 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fba 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fbc 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4fbd 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fbe 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4fbf 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4fc0 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4fc2 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fc1 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fc3 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4fc5 01-03 17:56:32.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fbb 01-03 17:56:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fc6 01-03 17:56:32.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:9120001249030466180 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4fc7 01-03 17:56:32.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9120001249030466180 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4fc8 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4fc9 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fca 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[4fcb 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fcc 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[4fcd 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[4fce 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 08 23 16 03 53 13 84 85 e1 7b cf e8 2a f8 79 |..#..S....{..*.y|
00000010 36 6b 36 70 6e 97 d3 70 ef 2c fc 64 6c af 2c 07 |6k6pn..p.,.dl.,.|
[4fcf 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a f0 81 78 fc de de 04 3e 20 1b 06 |0D. z..x....> ..|
00000010 ee 14 77 b6 f8 0b 04 ec e7 5f 0f 06 b1 30 7f 51 |..w......_...0.Q|
00000020 3a 5b 4c 9d 02 20 0e 06 50 20 1e 9d b7 1a 6a bd |:[L.. ..P ....j.|
00000030 dd 03 99 ea 0c fc 2d a8 1f 43 92 ba 53 70 4d 37 |......-..C..SpM7|
00000040 18 7e 84 09 83 b8 |.~....|
[4fd0 01-03 17:56:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4fd1 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d a3 43 b2 a9 ef 3a 4c 02 61 13 ba |0D. m.C...:L.a..|
00000010 a6 e4 19 a3 a0 70 22 66 d5 33 27 3b 4a 67 6e 90 |.....p"f.3';Jgn.|
00000020 8f 03 57 3e 02 20 5a 2b 43 1f bb 6d f5 50 a3 ff |..W>. Z+C..m.P..|
00000030 05 38 2d f9 78 ba bd 5d 59 86 48 4f a8 ff 75 de |.8-.x..]Y.HO..u.|
00000040 d2 12 d2 23 ae 97 |...#..|
[4fd2 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4fd3 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4fd4 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67
[4fd5 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67
[4fd6 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[4fd7 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fd8 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fd9 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fda 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[4fdb 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fdc 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fdd 01-03 17:56:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[4fde 01-03 17:56:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[4fdf 01-03 17:56:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[4fe0 01-03 17:56:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fc4 01-03 17:56:32.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4fe1 01-03 17:56:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4fe2 01-03 17:56:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fe3 01-03 17:56:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4fe4 01-03 17:56:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fe5 01-03 17:56:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4fe6 01-03 17:56:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4fe7 01-03 17:56:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4fe8 01-03 17:56:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[4fe9 01-03 17:56:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fea 01-03 17:56:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4fed 01-03 17:56:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4feb 01-03 17:56:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4fec 01-03 17:56:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fee 01-03 17:56:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4fef 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4ff0 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4ff1 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4ff2 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4ff3 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 f7 da 4d b5 15 2d c0 65 fb 46 ea 9a 4f 78 cb |...M..-.e.F..Ox.|
00000010 1d 59 a7 29 31 18 3a f8 6e 01 7a 18 da c2 96 37 |.Y.)1.:.n.z....7|
[4ff4 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 a6 8d 00 78 b0 ac 37 dd 68 7a |0E.!.....x..7.hz|
00000010 5f ba 29 6c 21 01 5a bd 03 e0 41 3f 25 ad 54 8b |_.)l!.Z...A?%.T.|
00000020 0c 77 94 d0 6e 02 20 77 75 67 92 1f 86 40 9f 58 |.w..n. wug...@.X|
00000030 56 e3 bb 2a dd 5e f2 9f ec ba a6 cd 89 20 22 77 |V..*.^....... "w|
00000040 bc cf 1e 63 30 fb b3 |...c0..|
[4ff5 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ff6 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f11e0 gate 1578074193019155600 evaluation starts
[4ff7 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f11e0 signed by 0 principal evaluation starts (used [false])
[4ff8 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f11e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[4ff9 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f11e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4ffa 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f11e0 principal evaluation fails
[4ffb 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f11e0 gate 1578074193019155600 evaluation fails
[4ffc 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4ffd 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4ffe 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4fff 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 f7 da 4d b5 15 2d c0 65 fb 46 ea 9a 4f 78 cb |...M..-.e.F..Ox.|
00000010 1d 59 a7 29 31 18 3a f8 6e 01 7a 18 da c2 96 37 |.Y.)1.:.n.z....7|
[5000 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 a6 8d 00 78 b0 ac 37 dd 68 7a |0E.!.....x..7.hz|
00000010 5f ba 29 6c 21 01 5a bd 03 e0 41 3f 25 ad 54 8b |_.)l!.Z...A?%.T.|
00000020 0c 77 94 d0 6e 02 20 77 75 67 92 1f 86 40 9f 58 |.w..n. wug...@.X|
00000030 56 e3 bb 2a dd 5e f2 9f ec ba a6 cd 89 20 22 77 |V..*.^....... "w|
00000040 bc cf 1e 63 30 fb b3 |...c0..|
[5001 01-03 17:56:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5002 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1ae0 gate 1578074193020009000 evaluation starts
[5003 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1ae0 signed by 0 principal evaluation starts (used [false])
[5004 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1ae0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5005 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1ae0 principal evaluation succeeds for identity 0
[5006 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f1ae0 gate 1578074193020009000 evaluation succeeds
[5007 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5008 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5009 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[500a 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[500b 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[500c 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes]}
[500d 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64
[500e 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64
[500f 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5010 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5011 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5012 01-03 17:56:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5013 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5014 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5015 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5016 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5017 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5018 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5019 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[501a 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501b 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501c 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501d 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501e 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501f 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5020 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5021 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5022 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5023 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5024 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5025 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5026 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5027 01-03 17:56:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5028 01-03 17:56:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:15687283561325371891 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5029 01-03 17:56:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:15687283561325371891 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[502a 01-03 17:56:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15687283561325371891 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[502b 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[502c 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[502d 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[502e 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[502f 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5030 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5031 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[5032 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5033 01-03 17:56:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:9230302929816343565 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5034 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:9230302929816343565 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5035 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9230302929816343565 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5036 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5037 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5038 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5039 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[503a 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[503b 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[503c 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[503d 01-03 17:56:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[503e 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[503f 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5040 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5041 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5042 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5043 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5044 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5045 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5046 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5047 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5048 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5049 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[504a 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 03 f4 88 cc 82 be 25 91 9e 63 f1 33 53 ea e9 |.......%..c.3S..|
00000010 67 f5 82 95 ef 8a 1c 83 03 7b 9d eb c0 f7 2f 25 |g........{..../%|
[504b 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 66 2a 43 5c 5c 3e e2 74 49 c0 2f |0D. ?f*C\\>.tI./|
00000010 86 05 a4 dd c8 df dc 96 db d6 b0 6a 60 25 21 a5 |...........j`%!.|
00000020 12 a9 f4 19 02 20 23 c9 9a da f6 d9 92 66 ab 0b |..... #......f..|
00000030 bc 94 38 c4 74 33 3b 66 07 7f a4 6c 6c 80 7a eb |..8.t3;f...ll.z.|
00000040 67 06 28 5a 64 0d |g.(Zd.|
[504c 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[504d 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b290 gate 1578074193106815100 evaluation starts
[504e 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b290 signed by 0 principal evaluation starts (used [false])
[504f 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b290 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5050 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5051 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b290 principal evaluation fails
[5052 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331b290 gate 1578074193106815100 evaluation fails
[5053 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5054 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5055 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5056 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 03 f4 88 cc 82 be 25 91 9e 63 f1 33 53 ea e9 |.......%..c.3S..|
00000010 67 f5 82 95 ef 8a 1c 83 03 7b 9d eb c0 f7 2f 25 |g........{..../%|
[5057 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 66 2a 43 5c 5c 3e e2 74 49 c0 2f |0D. ?f*C\\>.tI./|
00000010 86 05 a4 dd c8 df dc 96 db d6 b0 6a 60 25 21 a5 |...........j`%!.|
00000020 12 a9 f4 19 02 20 23 c9 9a da f6 d9 92 66 ab 0b |..... #......f..|
00000030 bc 94 38 c4 74 33 3b 66 07 7f a4 6c 6c 80 7a eb |..8.t3;f...ll.z.|
00000040 67 06 28 5a 64 0d |g.(Zd.|
[5058 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5059 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331bb90 gate 1578074193107383000 evaluation starts
[505a 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331bb90 signed by 0 principal evaluation starts (used [false])
[505b 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331bb90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[505c 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331bb90 principal evaluation succeeds for identity 0
[505d 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331bb90 gate 1578074193107383000 evaluation succeeds
[505e 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[505f 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5060 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5061 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5062 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5063 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes]}
[5064 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66
[5065 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66
[5066 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5067 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5068 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5069 01-03 17:56:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[506a 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[506b 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[506c 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[506d 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[506e 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[506f 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5070 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5071 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5072 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5073 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5074 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5075 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5076 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5077 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5078 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5079 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[507a 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[507b 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[507c 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[507d 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[507e 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[507f 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5080 01-03 17:56:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5081 01-03 17:56:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5082 01-03 17:56:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5083 01-03 17:56:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5084 01-03 17:56:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5085 01-03 17:56:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5086 01-03 17:56:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5087 01-03 17:56:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5088 01-03 17:56:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5089 01-03 17:56:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[508a 01-03 17:56:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[508b 01-03 17:56:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[508c 01-03 17:56:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[508d 01-03 17:56:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 62 3a cc 4a e6 b8 f3 21 07 77 8e 6e 29 89 a6 |ab:.J...!.w.n)..|
00000010 53 0e 62 b3 d3 15 76 17 d0 cc c6 da c1 00 f8 5d |S.b...v........]|
[508e 01-03 17:56:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 39 02 e2 c2 d4 cb 47 2c af c1 |0E.!..9.....G,..|
00000010 99 8b 21 74 72 ac 81 7f 7d 1a a5 bc 57 2e c1 e1 |..!tr...}...W...|
00000020 4d 2b ec 49 8a 02 20 25 ba b3 ad 94 29 70 a5 91 |M+.I.. %....)p..|
00000030 eb d7 bb 6d d5 38 f6 e3 c2 f7 61 0c d6 94 e2 81 |...m.8....a.....|
00000040 29 2a 5a 8e 17 98 14 |)*Z....|
[508f 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5090 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452490 gate 1578074193181362500 evaluation starts
[5091 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452490 signed by 0 principal evaluation starts (used [false])
[5092 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452490 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5093 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5094 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452490 principal evaluation fails
[5095 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452490 gate 1578074193181362500 evaluation fails
[5096 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5097 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5098 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5099 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 62 3a cc 4a e6 b8 f3 21 07 77 8e 6e 29 89 a6 |ab:.J...!.w.n)..|
00000010 53 0e 62 b3 d3 15 76 17 d0 cc c6 da c1 00 f8 5d |S.b...v........]|
[509a 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 39 02 e2 c2 d4 cb 47 2c af c1 |0E.!..9.....G,..|
00000010 99 8b 21 74 72 ac 81 7f 7d 1a a5 bc 57 2e c1 e1 |..!tr...}...W...|
00000020 4d 2b ec 49 8a 02 20 25 ba b3 ad 94 29 70 a5 91 |M+.I.. %....)p..|
00000030 eb d7 bb 6d d5 38 f6 e3 c2 f7 61 0c d6 94 e2 81 |...m.8....a.....|
00000040 29 2a 5a 8e 17 98 14 |)*Z....|
[509b 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[509c 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452d90 gate 1578074193183909700 evaluation starts
[509d 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452d90 signed by 0 principal evaluation starts (used [false])
[509e 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452d90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[509f 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452d90 principal evaluation succeeds for identity 0
[50a0 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003452d90 gate 1578074193183909700 evaluation succeeds
[50a1 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[50a2 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[50a3 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[50a4 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[50a5 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[50a6 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes]}
[50a7 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67
[50a8 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67
[50a9 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[50aa 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50ab 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50ac 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50ad 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[50ae 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50af 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50b0 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50b1 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[50b2 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[50b3 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[50b4 01-03 17:56:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50b5 01-03 17:56:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[50b6 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[50b7 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[50b8 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[50b9 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50ba 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[50bb 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[50bc 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[50bd 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[50be 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[50bf 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[50c0 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 f5 48 6e e0 13 01 57 35 cb 96 e5 ba 77 b3 fa |..Hn...W5....w..|
00000010 c3 b5 5a bc 98 36 0c c5 aa 2e 3f 62 e4 71 6d 6c |..Z..6....?b.qml|
[50c1 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 24 6e 0a 2e 9f 77 1d 2b 41 50 ac |0D. H$n...w.+AP.|
00000010 e6 cf 9c 40 7d bd 45 75 00 7c 5f a3 d8 27 e1 7b |...@}.Eu.|_..'.{|
00000020 cf c7 61 60 02 20 70 7f 99 1d dc 62 c3 e4 76 5c |..a`. p....b..v\|
00000030 71 ba 30 dc 31 3c 72 f0 96 0a 42 72 17 fd c2 a5 |q.0.1<r...Br....|
00000040 5c bd 74 83 38 7e |\.t.8~|
[50c2 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[50c3 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035819e0 gate 1578074193217486000 evaluation starts
[50c4 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035819e0 signed by 0 principal evaluation starts (used [false])
[50c5 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035819e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[50c6 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035819e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[50c7 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035819e0 principal evaluation fails
[50c8 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035819e0 gate 1578074193217486000 evaluation fails
[50c9 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[50ca 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[50cb 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[50cc 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 f5 48 6e e0 13 01 57 35 cb 96 e5 ba 77 b3 fa |..Hn...W5....w..|
00000010 c3 b5 5a bc 98 36 0c c5 aa 2e 3f 62 e4 71 6d 6c |..Z..6....?b.qml|
[50cd 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 24 6e 0a 2e 9f 77 1d 2b 41 50 ac |0D. H$n...w.+AP.|
00000010 e6 cf 9c 40 7d bd 45 75 00 7c 5f a3 d8 27 e1 7b |...@}.Eu.|_..'.{|
00000020 cf c7 61 60 02 20 70 7f 99 1d dc 62 c3 e4 76 5c |..a`. p....b..v\|
00000030 71 ba 30 dc 31 3c 72 f0 96 0a 42 72 17 fd c2 a5 |q.0.1<r...Br....|
00000040 5c bd 74 83 38 7e |\.t.8~|
[50ce 01-03 17:56:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[50cf 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b42e0 gate 1578074193220118600 evaluation starts
[50d0 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b42e0 signed by 0 principal evaluation starts (used [false])
[50d1 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b42e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[50d2 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b42e0 principal evaluation succeeds for identity 0
[50d3 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b42e0 gate 1578074193220118600 evaluation succeeds
[50d4 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[50d5 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[50d6 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[50d7 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[50d8 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[50d9 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes]}
[50da 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65
[50db 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65
[50dc 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[50dd 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50de 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50df 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50e0 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[50e1 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50e2 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50e3 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50e4 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[50e5 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[50e6 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[50e7 01-03 17:56:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50e8 01-03 17:56:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50e9 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315103F
[50ea 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4A8863B35C346C9D5AAC29D72203FEBDA6CD2A204F8077FC09FA1F40539535F6
[50eb 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[50ec 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[50ed 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[50ee 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50ef 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50f0 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50f1 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[50f2 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[50f3 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50f4 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[50f5 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[50f6 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[50f7 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50f8 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50f9 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[50fa 01-03 17:56:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50fb 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[50fc 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2067621382482816805 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[50fd 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[50fe 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3779477927989061903 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[50ff 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[5100 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2067621382482816805 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5101 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5102 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5703946752367673396 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5103 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5703946752367673396 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5104 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5105 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3779477927989061903 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5106 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5107 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3779477927989061903 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[5108 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3779477927989061903 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[5109 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[510a 01-03 17:56:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2067621382482816805 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[510b 01-03 17:56:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2067621382482816805 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[510c 01-03 17:56:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2067621382482816805 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[510d 01-03 17:56:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[510e 01-03 17:56:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5703946752367673396 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[510f 01-03 17:56:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5703946752367673396 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[5110 01-03 17:56:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5703946752367673396 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[5111 01-03 17:56:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5112 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151040
[5113 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 045541DE11399EB80E93A57D170DBFF748ABAA195A68E4F5D6D70A3929F64BAB
[5114 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5115 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5116 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5117 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[5118 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5119 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[511a 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[511b 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[511c 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[511d 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[511e 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[511f 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5120 01-03 17:56:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5121 01-03 17:56:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[5122 01-03 17:56:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5123 01-03 17:56:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[5124 01-03 17:56:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5125 01-03 17:56:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 55 41 de 11 39 9e b8 0e 93 a5 7d 17 0d bf f7 |.UA..9.....}....|
00000010 48 ab aa 19 5a 68 e4 f5 d6 d7 0a 39 29 f6 4b ab |H...Zh.....9).K.|
[5126 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 15 82 79 49 0d f6 bd c6 e1 45 |0E.!....yI.....E|
00000010 2f 66 c1 4f 8a 2d e5 38 2b 54 f7 a7 48 66 a7 99 |/f.O.-.8+T..Hf..|
00000020 f2 b4 8e aa 8a 02 20 18 93 d1 75 87 48 1c 04 54 |...... ...u.H..T|
00000030 f6 50 7e 60 98 b1 c4 4f 16 10 e0 48 1e d5 c5 e8 |.P~`...O...H....|
00000040 36 b8 ae 0b 5f 97 73 |6..._.s|
[5127 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[5128 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 ad db 82 2d 83 80 86 5b b6 82 e3 |0D. ....-...[...|
00000010 b4 37 ce 1f 07 9b 52 b4 27 9e 4d f7 1f 51 bc c7 |.7....R.'.M..Q..|
00000020 60 5d 39 f5 02 20 54 b3 73 f9 d4 3b 46 bb b0 08 |`]9.. T.s..;F...|
00000030 33 98 f6 8f 7a 94 d1 1b 9b aa 2f d3 1e c5 1d 55 |3...z...../....U|
00000040 fc 99 37 55 bd 74 |..7U.t|
[5129 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[512a 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[512b 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[512c 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[512d 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[512e 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[512f 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5130 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5131 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5132 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5133 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5134 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5135 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5136 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5137 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5138 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5139 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 f5 48 6e e0 13 01 57 35 cb 96 e5 ba 77 b3 fa |..Hn...W5....w..|
00000010 c3 b5 5a bc 98 36 0c c5 aa 2e 3f 62 e4 71 6d 6c |..Z..6....?b.qml|
[513a 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 24 6e 0a 2e 9f 77 1d 2b 41 50 ac |0D. H$n...w.+AP.|
00000010 e6 cf 9c 40 7d bd 45 75 00 7c 5f a3 d8 27 e1 7b |...@}.Eu.|_..'.{|
00000020 cf c7 61 60 02 20 70 7f 99 1d dc 62 c3 e4 76 5c |..a`. p....b..v\|
00000030 71 ba 30 dc 31 3c 72 f0 96 0a 42 72 17 fd c2 a5 |q.0.1<r...Br....|
00000040 5c bd 74 83 38 7e |\.t.8~|
[513b 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[513c 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecf40 gate 1578074193359252900 evaluation starts
[513d 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecf40 signed by 0 principal evaluation starts (used [false])
[513e 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecf40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[513f 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecf40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5140 01-03 17:56:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecf40 principal evaluation fails
[5141 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ecf40 gate 1578074193359252900 evaluation fails
[5142 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5143 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5144 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5145 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 f5 48 6e e0 13 01 57 35 cb 96 e5 ba 77 b3 fa |..Hn...W5....w..|
00000010 c3 b5 5a bc 98 36 0c c5 aa 2e 3f 62 e4 71 6d 6c |..Z..6....?b.qml|
[5146 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 24 6e 0a 2e 9f 77 1d 2b 41 50 ac |0D. H$n...w.+AP.|
00000010 e6 cf 9c 40 7d bd 45 75 00 7c 5f a3 d8 27 e1 7b |...@}.Eu.|_..'.{|
00000020 cf c7 61 60 02 20 70 7f 99 1d dc 62 c3 e4 76 5c |..a`. p....b..v\|
00000030 71 ba 30 dc 31 3c 72 f0 96 0a 42 72 17 fd c2 a5 |q.0.1<r...Br....|
00000040 5c bd 74 83 38 7e |\.t.8~|
[5147 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5148 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed930 gate 1578074193362321500 evaluation starts
[5149 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed930 signed by 0 principal evaluation starts (used [false])
[514a 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed930 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[514b 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed930 principal evaluation succeeds for identity 0
[514c 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ed930 gate 1578074193362321500 evaluation succeeds
[514d 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[514e 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[514f 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5150 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5151 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[5152 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5153 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5154 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 55 41 de 11 39 9e b8 0e 93 a5 7d 17 0d bf f7 |.UA..9.....}....|
00000010 48 ab aa 19 5a 68 e4 f5 d6 d7 0a 39 29 f6 4b ab |H...Zh.....9).K.|
[5155 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 15 82 79 49 0d f6 bd c6 e1 45 |0E.!....yI.....E|
00000010 2f 66 c1 4f 8a 2d e5 38 2b 54 f7 a7 48 66 a7 99 |/f.O.-.8+T..Hf..|
00000020 f2 b4 8e aa 8a 02 20 18 93 d1 75 87 48 1c 04 54 |...... ...u.H..T|
00000030 f6 50 7e 60 98 b1 c4 4f 16 10 e0 48 1e d5 c5 e8 |.P~`...O...H....|
00000040 36 b8 ae 0b 5f 97 73 |6..._.s|
[5156 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5157 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5158 01-03 17:56:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5159 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[515a 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 08 23 16 03 53 13 84 85 e1 7b cf e8 2a f8 79 |..#..S....{..*.y|
00000010 36 6b 36 70 6e 97 d3 70 ef 2c fc 64 6c af 2c 07 |6k6pn..p.,.dl.,.|
[515b 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a f0 81 78 fc de de 04 3e 20 1b 06 |0D. z..x....> ..|
00000010 ee 14 77 b6 f8 0b 04 ec e7 5f 0f 06 b1 30 7f 51 |..w......_...0.Q|
00000020 3a 5b 4c 9d 02 20 0e 06 50 20 1e 9d b7 1a 6a bd |:[L.. ..P ....j.|
00000030 dd 03 99 ea 0c fc 2d a8 1f 43 92 ba 53 70 4d 37 |......-..C..SpM7|
00000040 18 7e 84 09 83 b8 |.~....|
[515c 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[515d 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[515e 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[515f 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5160 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5161 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5163 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5162 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5164 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 55 41 de 11 39 9e b8 0e 93 a5 7d 17 0d bf f7 |.UA..9.....}....|
00000010 48 ab aa 19 5a 68 e4 f5 d6 d7 0a 39 29 f6 4b ab |H...Zh.....9).K.|
[5165 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 15 82 79 49 0d f6 bd c6 e1 45 |0E.!....yI.....E|
00000010 2f 66 c1 4f 8a 2d e5 38 2b 54 f7 a7 48 66 a7 99 |/f.O.-.8+T..Hf..|
00000020 f2 b4 8e aa 8a 02 20 18 93 d1 75 87 48 1c 04 54 |...... ...u.H..T|
00000030 f6 50 7e 60 98 b1 c4 4f 16 10 e0 48 1e d5 c5 e8 |.P~`...O...H....|
00000040 36 b8 ae 0b 5f 97 73 |6..._.s|
[5166 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5167 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[5168 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5169 01-03 17:56:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[516a 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[516b 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[516c 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[516d 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[516e 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[516f 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5170 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5171 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 62 3a cc 4a e6 b8 f3 21 07 77 8e 6e 29 89 a6 |ab:.J...!.w.n)..|
00000010 53 0e 62 b3 d3 15 76 17 d0 cc c6 da c1 00 f8 5d |S.b...v........]|
[5172 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 39 02 e2 c2 d4 cb 47 2c af c1 |0E.!..9.....G,..|
00000010 99 8b 21 74 72 ac 81 7f 7d 1a a5 bc 57 2e c1 e1 |..!tr...}...W...|
00000020 4d 2b ec 49 8a 02 20 25 ba b3 ad 94 29 70 a5 91 |M+.I.. %....)p..|
00000030 eb d7 bb 6d d5 38 f6 e3 c2 f7 61 0c d6 94 e2 81 |...m.8....a.....|
00000040 29 2a 5a 8e 17 98 14 |)*Z....|
[5173 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5174 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478f0 gate 1578074193384163800 evaluation starts
[5175 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478f0 signed by 0 principal evaluation starts (used [false])
[5176 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5177 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5178 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478f0 principal evaluation fails
[5179 01-03 17:56:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037478f0 gate 1578074193384163800 evaluation fails
[517a 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[517b 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[517c 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[517d 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 62 3a cc 4a e6 b8 f3 21 07 77 8e 6e 29 89 a6 |ab:.J...!.w.n)..|
00000010 53 0e 62 b3 d3 15 76 17 d0 cc c6 da c1 00 f8 5d |S.b...v........]|
[517e 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 39 02 e2 c2 d4 cb 47 2c af c1 |0E.!..9.....G,..|
00000010 99 8b 21 74 72 ac 81 7f 7d 1a a5 bc 57 2e c1 e1 |..!tr...}...W...|
00000020 4d 2b ec 49 8a 02 20 25 ba b3 ad 94 29 70 a5 91 |M+.I.. %....)p..|
00000030 eb d7 bb 6d d5 38 f6 e3 c2 f7 61 0c d6 94 e2 81 |...m.8....a.....|
00000040 29 2a 5a 8e 17 98 14 |)*Z....|
[517f 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5180 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c1f0 gate 1578074193393318600 evaluation starts
[5181 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c1f0 signed by 0 principal evaluation starts (used [false])
[5182 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c1f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5183 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c1f0 principal evaluation succeeds for identity 0
[5184 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c1f0 gate 1578074193393318600 evaluation succeeds
[5185 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5186 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5187 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5188 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5189 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[518a 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[518b 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[518c 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 08 23 16 03 53 13 84 85 e1 7b cf e8 2a f8 79 |..#..S....{..*.y|
00000010 36 6b 36 70 6e 97 d3 70 ef 2c fc 64 6c af 2c 07 |6k6pn..p.,.dl.,.|
[518d 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a f0 81 78 fc de de 04 3e 20 1b 06 |0D. z..x....> ..|
00000010 ee 14 77 b6 f8 0b 04 ec e7 5f 0f 06 b1 30 7f 51 |..w......_...0.Q|
00000020 3a 5b 4c 9d 02 20 0e 06 50 20 1e 9d b7 1a 6a bd |:[L.. ..P ....j.|
00000030 dd 03 99 ea 0c fc 2d a8 1f 43 92 ba 53 70 4d 37 |......-..C..SpM7|
00000040 18 7e 84 09 83 b8 |.~....|
[518e 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[518f 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5190 01-03 17:56:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5191 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5192 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5193 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[5194 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[5195 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5196 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[5197 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5198 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[5199 01-03 17:56:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[519a 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[519b 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[519c 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[519d 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[519e 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[519f 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51a0 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51a1 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[51a2 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[51a3 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[51a4 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[51a5 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[51a6 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[51a7 01-03 17:56:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[51a8 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[51a9 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51aa 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003769aa0 gate 1578074193420798800 evaluation starts
[51ab 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003769aa0 signed by 0 principal evaluation starts (used [false])
[51ac 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003769aa0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[51ad 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003769aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[51ae 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003769aa0 principal evaluation fails
[51af 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003769aa0 gate 1578074193420798800 evaluation fails
[51b0 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[51b1 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[51b2 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[51b3 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[51b4 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[51b5 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51b6 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e43a0 gate 1578074193426636200 evaluation starts
[51b7 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e43a0 signed by 0 principal evaluation starts (used [false])
[51b8 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e43a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[51b9 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e43a0 principal evaluation succeeds for identity 0
[51ba 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e43a0 gate 1578074193426636200 evaluation succeeds
[51bb 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[51bc 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[51bf 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[51bd 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[51be 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[51c0 01-03 17:56:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[51c1 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51c2 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51c3 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[51c4 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[51c5 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[51c6 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[51c7 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[51c8 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[51c9 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[51ca 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[51cb 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51cc 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836040 gate 1578074193435803400 evaluation starts
[51cd 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836040 signed by 0 principal evaluation starts (used [false])
[51ce 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836040 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[51cf 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[51d0 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836040 principal evaluation fails
[51d1 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836040 gate 1578074193435803400 evaluation fails
[51d2 01-03 17:56:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[51d3 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[51d4 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[51d5 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[51d6 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[51d7 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51d8 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836940 gate 1578074193445854900 evaluation starts
[51d9 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836940 signed by 0 principal evaluation starts (used [false])
[51da 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836940 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[51db 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836940 principal evaluation succeeds for identity 0
[51dc 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836940 gate 1578074193445854900 evaluation succeeds
[51dd 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[51de 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[51df 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[51e0 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[51e1 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[51e2 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[51e3 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51e4 01-03 17:56:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51e5 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51e6 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[51e7 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[51e8 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[51e9 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[51ea 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[51eb 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[51ec 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[51ed 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[51ee 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51ef 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fc660 gate 1578074193469386000 evaluation starts
[51f0 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fc660 signed by 0 principal evaluation starts (used [false])
[51f1 01-03 17:56:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fc660 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[51f2 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fc660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[51f3 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fc660 principal evaluation fails
[51f4 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fc660 gate 1578074193469386000 evaluation fails
[51f5 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[51f6 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[51f7 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[51f8 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[51f9 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[51fa 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51fb 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fcf60 gate 1578074193473271400 evaluation starts
[51fc 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fcf60 signed by 0 principal evaluation starts (used [false])
[51fd 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fcf60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[51fe 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fcf60 principal evaluation succeeds for identity 0
[51ff 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fcf60 gate 1578074193473271400 evaluation succeeds
[5200 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5201 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5202 01-03 17:56:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5203 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5204 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[5205 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[5206 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5207 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5208 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5209 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[520a 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[520b 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[520c 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[520d 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[520e 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[520f 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5210 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5211 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490a0 gate 1578074193485740100 evaluation starts
[5212 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490a0 signed by 0 principal evaluation starts (used [false])
[5213 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5214 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5215 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490a0 principal evaluation fails
[5216 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490a0 gate 1578074193485740100 evaluation fails
[5217 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5218 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5219 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[521a 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[521b 01-03 17:56:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[521c 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[521d 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039499a0 gate 1578074193490583800 evaluation starts
[521e 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039499a0 signed by 0 principal evaluation starts (used [false])
[521f 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039499a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5220 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039499a0 principal evaluation succeeds for identity 0
[5221 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039499a0 gate 1578074193490583800 evaluation succeeds
[5222 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5223 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5224 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5225 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5226 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[5227 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5228 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5229 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[522a 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[522b 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[522c 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[522d 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[522e 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[522f 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5230 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5231 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5232 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5233 01-03 17:56:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5234 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5235 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5236 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961e90 gate 1578074193501081300 evaluation starts
[5237 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961e90 signed by 0 principal evaluation starts (used [false])
[5238 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961e90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5239 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[523a 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961e90 principal evaluation fails
[523b 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003961e90 gate 1578074193501081300 evaluation fails
[523c 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[523d 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[523e 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[523f 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5240 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5241 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5242 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa7a0 gate 1578074193502721100 evaluation starts
[5243 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa7a0 signed by 0 principal evaluation starts (used [false])
[5244 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa7a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5245 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa7a0 principal evaluation succeeds for identity 0
[5246 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fa7a0 gate 1578074193502721100 evaluation succeeds
[5247 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5248 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5249 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[524a 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[524b 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[524c 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[524d 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[524e 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[524f 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5250 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5251 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5252 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5253 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5254 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5255 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5256 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5257 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5258 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5259 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[525a 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f70 gate 1578074193509625700 evaluation starts
[525b 01-03 17:56:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f70 signed by 0 principal evaluation starts (used [false])
[525c 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[525d 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[525e 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f70 principal evaluation fails
[525f 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14f70 gate 1578074193509625700 evaluation fails
[5260 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5261 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5262 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5263 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5264 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5265 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5266 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15880 gate 1578074193518440500 evaluation starts
[5267 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15880 signed by 0 principal evaluation starts (used [false])
[5268 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15880 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5269 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15880 principal evaluation succeeds for identity 0
[526a 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15880 gate 1578074193518440500 evaluation succeeds
[526b 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[526c 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[526d 01-03 17:56:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[526e 01-03 17:56:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[526f 01-03 17:56:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5270 01-03 17:56:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5271 01-03 17:56:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5272 01-03 17:56:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[5273 01-03 17:56:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5274 01-03 17:56:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5275 01-03 17:56:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13980146180992712247 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[5276 01-03 17:56:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13980146180992712247 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5277 01-03 17:56:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5278 01-03 17:56:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13980146180992712247 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[5279 01-03 17:56:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13980146180992712247 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 40 bytes, Signature: 0 bytes
[527a 01-03 17:56:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[527b 01-03 17:56:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[527c 01-03 17:56:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[527d 01-03 17:56:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[527e 01-03 17:56:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[527f 01-03 17:56:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17336149046707905419 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5280 01-03 17:56:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17336149046707905419 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5281 01-03 17:56:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5282 01-03 17:56:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5283 01-03 17:56:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[5284 01-03 17:56:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[5285 01-03 17:56:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5286 01-03 17:56:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5287 01-03 17:56:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5288 01-03 17:56:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5289 01-03 17:56:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[528a 01-03 17:56:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[528b 01-03 17:56:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[528c 01-03 17:56:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[528d 01-03 17:56:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[528e 01-03 17:56:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[528f 01-03 17:56:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:8611254621855125562 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5290 01-03 17:56:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8611254621855125562 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5291 01-03 17:56:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5292 01-03 17:56:35.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5293 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[5294 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5295 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[5296 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5297 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 01 2a 6d 9c 84 7a 24 f0 b0 a3 22 05 d4 a7 a0 |\.*m..z$..."....|
00000010 fd e4 12 b5 95 16 f6 a8 56 28 a9 01 a6 9b c9 64 |........V(.....d|
[5298 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 23 8b b3 9b f7 13 9e 90 78 2e 48 |0D. G#.......x.H|
00000010 4d b8 99 5e 81 89 aa a9 b9 76 44 de e0 7f d6 8e |M..^.....vD.....|
00000020 30 90 5a f5 02 20 15 64 28 e5 64 9d 3d f7 72 d0 |0.Z.. .d(.d.=.r.|
00000030 d3 a4 7e 4c 94 20 03 03 46 6d 5e cc eb 02 0d a2 |..~L. ..Fm^.....|
00000040 4e 0b fd 87 49 a5 |N...I.|
[5299 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[529a 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 d3 23 88 9f 8f e9 20 ba a7 5b 63 |0D. Q.#.... ..[c|
00000010 66 be 0b cf 25 42 8e 87 84 4b 2c c2 9c cd 62 60 |f...%B...K,...b`|
00000020 24 1f 80 46 02 20 70 cc ec 4f 24 dc 98 6f 49 7c |$..F. p..O$..oI||
00000030 0c f2 21 1c 1d 9e 3e 18 c7 22 32 6c f5 21 9c e9 |..!...>.."2l.!..|
00000040 45 28 9c 90 6e 32 |E(..n2|
[529b 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[529c 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[529d 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:68
[529e 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:68
[529f 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[52a0 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52a1 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52a2 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52a3 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[52a4 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52a5 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52a6 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers
[52a7 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[52a8 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[52a9 01-03 17:56:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52aa 01-03 17:56:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[52ab 01-03 17:56:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[52ac 01-03 17:56:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510171801
[52ad 01-03 17:56:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5B5226A804A60ADB55EABD86BC54D7BCFF4D25FE92243636284B8CD9F03E0A3B
[52ae 01-03 17:56:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[52af 01-03 17:56:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52b0 01-03 17:56:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52b1 01-03 17:56:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52b2 01-03 17:56:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52b3 01-03 17:56:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:23 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[52b4 01-03 17:56:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52b5 01-03 17:56:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52b6 01-03 17:56:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:23 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[52b7 01-03 17:56:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52b8 01-03 17:56:36.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[52b9 01-03 17:56:36.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52ba 01-03 17:56:36.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[52bb 01-03 17:56:36.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[52bc 01-03 17:56:36.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 34 c1 b0 b8 eb 68 37 34 e6 72 df a5 40 fd 36 |x4....h74.r..@.6|
00000010 9d 13 39 ee db cd 90 c2 74 41 74 30 41 a0 82 1b |..9.....tAt0A...|
[52bd 01-03 17:56:36.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 84 01 a0 6d d1 98 41 9a 4f d6 |0E.!.....m..A.O.|
00000010 d8 08 e7 dd d7 fa 4b 08 c5 3c e6 b3 14 2d 99 d0 |......K..<...-..|
00000020 51 ba 1c 49 e2 02 20 12 65 88 22 aa a9 fd d0 55 |Q..I.. .e."....U|
00000030 07 18 0c 8e 46 fb 58 69 a1 b1 cf 32 2d 7e eb 68 |....F.Xi...2-~.h|
00000040 b1 37 96 a8 6f e3 62 |.7..o.b|
[52be 01-03 17:56:36.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[52bf 01-03 17:56:36.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 32 91 f7 27 b5 93 aa 56 65 da 09 |0D. .2..'...Ve..|
00000010 fa 86 11 fd 08 eb f3 c4 83 2b 28 5e 2b 29 5f d7 |.........+(^+)_.|
00000020 1a 2d 7f 1b 02 20 35 41 14 fe 94 6e bc 61 7e ae |.-... 5A...n.a~.|
00000030 84 43 b5 44 39 40 f1 3e 7c c8 47 77 fa 36 e6 15 |.C.D9@.>|.Gw.6..|
00000040 3c 20 6e a5 9b 3d |< n..=|
[52c0 01-03 17:56:36.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[52c1 01-03 17:56:36.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[52c2 01-03 17:56:36.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69
[52c3 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69
[52c4 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[52c5 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52c6 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52c7 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52c8 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[52c9 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[52ca 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52cb 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[52cc 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52cd 01-03 17:56:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ce 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52cf 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52d0 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[52d1 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52d3 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[52d2 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[52d4 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[52d5 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52d6 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52d7 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[52d8 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[52d9 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52da 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[52db 01-03 17:56:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52dc 01-03 17:56:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:299562761961736981 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[52dd 01-03 17:56:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:299562761961736981 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[52de 01-03 17:56:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:299562761961736981 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[52df 01-03 17:56:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52e0 01-03 17:56:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52e1 01-03 17:56:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52e2 01-03 17:56:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52e3 01-03 17:56:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52e4 01-03 17:56:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52e5 01-03 17:56:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[52e6 01-03 17:56:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52e7 01-03 17:56:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:9678116986466422266 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[52e8 01-03 17:56:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:9678116986466422266 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[52e9 01-03 17:56:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9678116986466422266 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[52ea 01-03 17:56:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52eb 01-03 17:56:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ec 01-03 17:56:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ed 01-03 17:56:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ee 01-03 17:56:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ef 01-03 17:56:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52f0 01-03 17:56:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[52f1 01-03 17:56:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52f2 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[52f3 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[52f4 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[52f5 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[52f6 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52f7 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[52f8 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[52f9 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[52fa 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[52fb 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[52fc 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[52fd 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d e6 0e ab 13 a7 95 a3 41 3e d2 14 94 a3 1c a4 |}.......A>......|
00000010 df d3 c0 e5 69 17 38 51 ae db 2e 85 93 83 0a 02 |....i.8Q........|
[52fe 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 68 f7 27 24 8d 6c 82 54 ee 6a 32 1a |0C..h.'$.l.T.j2.|
00000010 ff 1b 03 0b e1 8d ad 83 b2 ce e2 95 1a b1 47 21 |..............G!|
00000020 74 8b 78 02 20 7e fe 44 fa 68 ef 3d c2 72 9d 63 |t.x. ~.D.h.=.r.c|
00000030 4a 85 6c e1 0c cb 51 dc 1c 55 bd 42 3d 0d a7 87 |J.l...Q..U.B=...|
00000040 49 20 db 77 e4 |I .w.|
[52ff 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5300 01-03 17:56:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00918c480 gate 1578074197169913600 evaluation starts
[5301 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00918c480 signed by 0 principal evaluation starts (used [false])
[5302 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00918c480 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5303 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00918c480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5304 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00918c480 principal evaluation fails
[5305 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00918c480 gate 1578074197169913600 evaluation fails
[5306 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5307 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5308 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5309 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[530a 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d e6 0e ab 13 a7 95 a3 41 3e d2 14 94 a3 1c a4 |}.......A>......|
00000010 df d3 c0 e5 69 17 38 51 ae db 2e 85 93 83 0a 02 |....i.8Q........|
[530b 01-03 17:56:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 68 f7 27 24 8d 6c 82 54 ee 6a 32 1a |0C..h.'$.l.T.j2.|
00000010 ff 1b 03 0b e1 8d ad 83 b2 ce e2 95 1a b1 47 21 |..............G!|
00000020 74 8b 78 02 20 7e fe 44 fa 68 ef 3d c2 72 9d 63 |t.x. ~.D.h.=.r.c|
00000030 4a 85 6c e1 0c cb 51 dc 1c 55 bd 42 3d 0d a7 87 |J.l...Q..U.B=...|
00000040 49 20 db 77 e4 |I .w.|
[530c 01-03 17:56:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[530d 01-03 17:56:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df5c0 gate 1578074197180475500 evaluation starts
[530e 01-03 17:56:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df5c0 signed by 0 principal evaluation starts (used [false])
[530f 01-03 17:56:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df5c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5310 01-03 17:56:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df5c0 principal evaluation succeeds for identity 0
[5311 01-03 17:56:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0090df5c0 gate 1578074197180475500 evaluation succeeds
[5312 01-03 17:56:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5313 01-03 17:56:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5314 01-03 17:56:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5315 01-03 17:56:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5316 01-03 17:56:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5317 01-03 17:56:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5318 01-03 17:56:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68 , Envelope: 83 bytes, Signature: 69 bytes
[5319 01-03 17:56:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68 , Envelope: 83 bytes, Signature: 69 bytes]}
[531a 01-03 17:56:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68
[531b 01-03 17:56:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68
[531c 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[531d 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[531e 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[531f 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5320 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[5321 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5322 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5323 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5325 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5326 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[5324 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5327 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5329 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5328 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[532a 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[532b 01-03 17:56:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[532c 01-03 17:56:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[532d 01-03 17:56:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[532e 01-03 17:56:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[532f 01-03 17:56:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5330 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d 7f f6 24 e2 a4 30 2d 81 5c 16 50 c3 fc 7e |....$..0-.\.P..~|
00000010 ea 75 ae dd 81 1e 2c 4e 86 32 1e 5b 43 83 e9 81 |.u....,N.2.[C...|
[5331 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 55 16 17 96 55 67 89 ac 5a 87 bb |0D. uU...Ug..Z..|
00000010 e6 39 87 33 98 4f 05 b8 88 f3 3c 52 c7 2c 38 aa |.9.3.O....<R.,8.|
00000020 21 bf 42 59 02 20 32 a0 ad 53 10 e5 ac 5b f6 98 |!.BY. 2..S...[..|
00000030 30 91 3a f4 5e 23 83 78 3e 2b 55 8e d4 3f 5b df |0.:.^#.x>+U..?[.|
00000040 26 d8 c8 f3 4c 44 |&...LD|
[5332 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5333 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922c630 gate 1578074197234136100 evaluation starts
[5334 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922c630 signed by 0 principal evaluation starts (used [false])
[5335 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922c630 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5336 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922c630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5337 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922c630 principal evaluation fails
[5338 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922c630 gate 1578074197234136100 evaluation fails
[5339 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[533a 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[533b 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[533c 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d 7f f6 24 e2 a4 30 2d 81 5c 16 50 c3 fc 7e |....$..0-.\.P..~|
00000010 ea 75 ae dd 81 1e 2c 4e 86 32 1e 5b 43 83 e9 81 |.u....,N.2.[C...|
[533d 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 55 16 17 96 55 67 89 ac 5a 87 bb |0D. uU...Ug..Z..|
00000010 e6 39 87 33 98 4f 05 b8 88 f3 3c 52 c7 2c 38 aa |.9.3.O....<R.,8.|
00000020 21 bf 42 59 02 20 32 a0 ad 53 10 e5 ac 5b f6 98 |!.BY. 2..S...[..|
00000030 30 91 3a f4 5e 23 83 78 3e 2b 55 8e d4 3f 5b df |0.:.^#.x>+U..?[.|
00000040 26 d8 c8 f3 4c 44 |&...LD|
[533e 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[533f 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922cf40 gate 1578074197235930400 evaluation starts
[5340 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922cf40 signed by 0 principal evaluation starts (used [false])
[5341 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922cf40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5342 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922cf40 principal evaluation succeeds for identity 0
[5343 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00922cf40 gate 1578074197235930400 evaluation succeeds
[5344 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5345 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5346 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5347 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5348 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5349 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes]}
[534a 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66
[534b 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66
[534c 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[534d 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[534e 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[534f 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5350 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[5351 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5352 01-03 17:56:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5353 01-03 17:56:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[5354 01-03 17:56:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5355 01-03 17:56:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5356 01-03 17:56:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[5357 01-03 17:56:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5358 01-03 17:56:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[5359 01-03 17:56:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[535a 01-03 17:56:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[535b 01-03 17:56:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:620461851601173529 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[535c 01-03 17:56:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[535d 01-03 17:56:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13784421900841915183 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[535e 01-03 17:56:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[535f 01-03 17:56:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15179779292273647727 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[5360 01-03 17:56:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15179779292273647727 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5361 01-03 17:56:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5362 01-03 17:56:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:620461851601173529 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5363 01-03 17:56:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5364 01-03 17:56:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13784421900841915183 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5365 01-03 17:56:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5366 01-03 17:56:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15179779292273647727 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[5367 01-03 17:56:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15179779292273647727 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[5368 01-03 17:56:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5369 01-03 17:56:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 620461851601173529 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[536a 01-03 17:56:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 620461851601173529 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[536b 01-03 17:56:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 620461851601173529 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[536c 01-03 17:56:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[536d 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13784421900841915183 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[536e 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151041
[536f 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 162E5B56B9AC51928D1BEF26E022A114FF77C6B403A089CC0301FABD6E51B9E3
[5370 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13784421900841915183 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[5371 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13784421900841915183 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[5372 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5373 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5374 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[5375 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5376 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[5377 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5378 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[537a 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[537b 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[537d 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5379 01-03 17:56:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[537c 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[537e 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[537f 01-03 17:56:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5380 01-03 17:56:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[5381 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5382 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[5383 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5384 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 2e 5b 56 b9 ac 51 92 8d 1b ef 26 e0 22 a1 14 |..[V..Q....&."..|
00000010 ff 77 c6 b4 03 a0 89 cc 03 01 fa bd 6e 51 b9 e3 |.w..........nQ..|
[5385 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 7a 56 31 50 8e ff 0a 55 2f 9e |0E.!..zV1P...U/.|
00000010 4f 6b ef ce 0b 67 70 05 3f 20 2b a4 c6 97 cc cf |Ok...gp.? +.....|
00000020 bf 4a 78 c9 e2 02 20 7e 10 6c 8d f8 3b 3e a0 c2 |.Jx... ~.l..;>..|
00000030 14 c9 c1 fc 9e d9 ea af df 4f e7 51 c6 c4 a9 af |.........O.Q....|
00000040 bb bc 65 f2 6a 69 ad |..e.ji.|
[5386 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[5387 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 90 a6 0a 23 69 05 03 0a 66 20 04 |0D. B...#i...f .|
00000010 b4 7a 3d 6a 37 c3 39 be 16 0a 56 8b 57 33 43 13 |.z=j7.9...V.W3C.|
00000020 c2 53 18 db 02 20 61 c1 e5 14 c9 88 6b a2 02 b8 |.S... a.....k...|
00000030 cb bf 5d b2 5d 5a d7 0e b1 68 07 3f ed af 3f 70 |..].]Z...h.?..?p|
00000040 0c 6b 5c de 24 e3 |.k\.$.|
[5388 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5389 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[538a 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[538b 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[538c 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[538d 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[538e 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[538f 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5390 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5391 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5392 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5393 01-03 17:56:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5394 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5395 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5396 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5397 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5398 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5399 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[539a 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d 7f f6 24 e2 a4 30 2d 81 5c 16 50 c3 fc 7e |....$..0-.\.P..~|
00000010 ea 75 ae dd 81 1e 2c 4e 86 32 1e 5b 43 83 e9 81 |.u....,N.2.[C...|
[539b 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 55 16 17 96 55 67 89 ac 5a 87 bb |0D. uU...Ug..Z..|
00000010 e6 39 87 33 98 4f 05 b8 88 f3 3c 52 c7 2c 38 aa |.9.3.O....<R.,8.|
00000020 21 bf 42 59 02 20 32 a0 ad 53 10 e5 ac 5b f6 98 |!.BY. 2..S...[..|
00000030 30 91 3a f4 5e 23 83 78 3e 2b 55 8e d4 3f 5b df |0.:.^#.x>+U..?[.|
00000040 26 d8 c8 f3 4c 44 |&...LD|
[539c 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[539d 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e54bc0 gate 1578074197379107300 evaluation starts
[539e 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e54bc0 signed by 0 principal evaluation starts (used [false])
[539f 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e54bc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[53a0 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e54bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[53a1 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e54bc0 principal evaluation fails
[53a2 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e54bc0 gate 1578074197379107300 evaluation fails
[53a3 01-03 17:56:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[53a4 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[53a5 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[53a6 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d 7f f6 24 e2 a4 30 2d 81 5c 16 50 c3 fc 7e |....$..0-.\.P..~|
00000010 ea 75 ae dd 81 1e 2c 4e 86 32 1e 5b 43 83 e9 81 |.u....,N.2.[C...|
[53a7 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 55 16 17 96 55 67 89 ac 5a 87 bb |0D. uU...Ug..Z..|
00000010 e6 39 87 33 98 4f 05 b8 88 f3 3c 52 c7 2c 38 aa |.9.3.O....<R.,8.|
00000020 21 bf 42 59 02 20 32 a0 ad 53 10 e5 ac 5b f6 98 |!.BY. 2..S...[..|
00000030 30 91 3a f4 5e 23 83 78 3e 2b 55 8e d4 3f 5b df |0.:.^#.x>+U..?[.|
00000040 26 d8 c8 f3 4c 44 |&...LD|
[53a8 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[53a9 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e554c0 gate 1578074197383453000 evaluation starts
[53aa 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e554c0 signed by 0 principal evaluation starts (used [false])
[53ab 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e554c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[53ac 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e554c0 principal evaluation succeeds for identity 0
[53ad 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e554c0 gate 1578074197383453000 evaluation succeeds
[53ae 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[53af 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[53b0 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[53b1 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[53b2 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[53b3 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53b4 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[53b5 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 2e 5b 56 b9 ac 51 92 8d 1b ef 26 e0 22 a1 14 |..[V..Q....&."..|
00000010 ff 77 c6 b4 03 a0 89 cc 03 01 fa bd 6e 51 b9 e3 |.w..........nQ..|
[53b6 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 7a 56 31 50 8e ff 0a 55 2f 9e |0E.!..zV1P...U/.|
00000010 4f 6b ef ce 0b 67 70 05 3f 20 2b a4 c6 97 cc cf |Ok...gp.? +.....|
00000020 bf 4a 78 c9 e2 02 20 7e 10 6c 8d f8 3b 3e a0 c2 |.Jx... ~.l..;>..|
00000030 14 c9 c1 fc 9e d9 ea af df 4f e7 51 c6 c4 a9 af |.........O.Q....|
00000040 bb bc 65 f2 6a 69 ad |..e.ji.|
[53b7 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[53b8 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[53b9 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53ba 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53bb 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53bc 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[53bd 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[53be 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 2e 5b 56 b9 ac 51 92 8d 1b ef 26 e0 22 a1 14 |..[V..Q....&."..|
00000010 ff 77 c6 b4 03 a0 89 cc 03 01 fa bd 6e 51 b9 e3 |.w..........nQ..|
[53bf 01-03 17:56:37.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 7a 56 31 50 8e ff 0a 55 2f 9e |0E.!..zV1P...U/.|
00000010 4f 6b ef ce 0b 67 70 05 3f 20 2b a4 c6 97 cc cf |Ok...gp.? +.....|
00000020 bf 4a 78 c9 e2 02 20 7e 10 6c 8d f8 3b 3e a0 c2 |.Jx... ~.l..;>..|
00000030 14 c9 c1 fc 9e d9 ea af df 4f e7 51 c6 c4 a9 af |.........O.Q....|
00000040 bb bc 65 f2 6a 69 ad |..e.ji.|
[53c0 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[53c1 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[53c2 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53c3 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[53c4 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53c5 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[53c6 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[53c7 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[53c8 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[53c9 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[53ca 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[53cb 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d e6 0e ab 13 a7 95 a3 41 3e d2 14 94 a3 1c a4 |}.......A>......|
00000010 df d3 c0 e5 69 17 38 51 ae db 2e 85 93 83 0a 02 |....i.8Q........|
[53cc 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 68 f7 27 24 8d 6c 82 54 ee 6a 32 1a |0C..h.'$.l.T.j2.|
00000010 ff 1b 03 0b e1 8d ad 83 b2 ce e2 95 1a b1 47 21 |..............G!|
00000020 74 8b 78 02 20 7e fe 44 fa 68 ef 3d c2 72 9d 63 |t.x. ~.D.h.=.r.c|
00000030 4a 85 6c e1 0c cb 51 dc 1c 55 bd 42 3d 0d a7 87 |J.l...Q..U.B=...|
00000040 49 20 db 77 e4 |I .w.|
[53cd 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[53ce 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e86850 gate 1578074197394690200 evaluation starts
[53cf 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e86850 signed by 0 principal evaluation starts (used [false])
[53d0 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e86850 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[53d1 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e86850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[53d2 01-03 17:56:37.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e86850 principal evaluation fails
[53d3 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e86850 gate 1578074197394690200 evaluation fails
[53d4 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[53d5 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[53d6 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[53d7 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d e6 0e ab 13 a7 95 a3 41 3e d2 14 94 a3 1c a4 |}.......A>......|
00000010 df d3 c0 e5 69 17 38 51 ae db 2e 85 93 83 0a 02 |....i.8Q........|
[53d8 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 68 f7 27 24 8d 6c 82 54 ee 6a 32 1a |0C..h.'$.l.T.j2.|
00000010 ff 1b 03 0b e1 8d ad 83 b2 ce e2 95 1a b1 47 21 |..............G!|
00000020 74 8b 78 02 20 7e fe 44 fa 68 ef 3d c2 72 9d 63 |t.x. ~.D.h.=.r.c|
00000030 4a 85 6c e1 0c cb 51 dc 1c 55 bd 42 3d 0d a7 87 |J.l...Q..U.B=...|
00000040 49 20 db 77 e4 |I .w.|
[53d9 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[53da 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e87150 gate 1578074197403844400 evaluation starts
[53db 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e87150 signed by 0 principal evaluation starts (used [false])
[53dc 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e87150 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[53dd 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e87150 principal evaluation succeeds for identity 0
[53df 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e87150 gate 1578074197403844400 evaluation succeeds
[53de 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53e0 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53e1 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[53e2 01-03 17:56:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[53e3 01-03 17:56:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53e4 01-03 17:56:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[53e5 01-03 17:56:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53e6 01-03 17:56:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[53e7 01-03 17:56:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53e8 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[53e9 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[53ea 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53eb 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53ec 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53ed 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[53ee 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[53ef 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[53f0 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[53f1 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[53f2 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[53f3 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[53f4 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[53f5 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[53f6 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4300 gate 1578074197435867300 evaluation starts
[53f7 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4300 signed by 0 principal evaluation starts (used [false])
[53f8 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4300 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[53f9 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[53fa 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4300 principal evaluation fails
[53fb 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4300 gate 1578074197435867300 evaluation fails
[53fc 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[53fd 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[53fe 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[53ff 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5400 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5401 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5402 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4c00 gate 1578074197438347800 evaluation starts
[5403 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4c00 signed by 0 principal evaluation starts (used [false])
[5404 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4c00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5405 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4c00 principal evaluation succeeds for identity 0
[5406 01-03 17:56:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb4c00 gate 1578074197438347800 evaluation succeeds
[5407 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5408 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5409 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[540a 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[540b 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[540c 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[540d 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[540e 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[540f 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5410 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5411 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5412 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5414 01-03 17:56:37.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5415 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5416 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5417 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5418 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68 , Envelope: 83 bytes, Signature: 69 bytes
[5419 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[541a 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5413 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[541b 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[541c 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[541d 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[541e 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[541f 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5420 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5421 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5422 01-03 17:56:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0180 gate 1578074197446697500 evaluation starts
[5423 01-03 17:56:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0180 signed by 0 principal evaluation starts (used [false])
[5424 01-03 17:56:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0180 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5425 01-03 17:56:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5426 01-03 17:56:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0180 principal evaluation fails
[5427 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0180 gate 1578074197446697500 evaluation fails
[5428 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5429 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[542a 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[542b 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[542c 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[542d 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[542e 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0a80 gate 1578074197465838900 evaluation starts
[542f 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0a80 signed by 0 principal evaluation starts (used [false])
[5430 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0a80 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5431 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0a80 principal evaluation succeeds for identity 0
[5432 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee0a80 gate 1578074197465838900 evaluation succeeds
[5433 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5434 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5435 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5436 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5437 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5438 01-03 17:56:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5439 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[543a 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[543b 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[543c 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[543d 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[543e 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[543f 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5440 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5441 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5442 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5443 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5444 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5445 01-03 17:56:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5446 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5447 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5448 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efb420 gate 1578074197481989500 evaluation starts
[5449 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efb420 signed by 0 principal evaluation starts (used [false])
[544a 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efb420 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[544b 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efb420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[544c 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efb420 principal evaluation fails
[544d 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efb420 gate 1578074197481989500 evaluation fails
[544e 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[544f 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5450 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5451 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5452 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5453 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5454 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbd20 gate 1578074197486332500 evaluation starts
[5455 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbd20 signed by 0 principal evaluation starts (used [false])
[5456 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbd20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5457 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbd20 principal evaluation succeeds for identity 0
[5458 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbd20 gate 1578074197486332500 evaluation succeeds
[5459 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[545a 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[545b 01-03 17:56:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[545c 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[545d 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[545e 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[545f 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5460 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5461 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5462 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5463 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5464 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5465 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5466 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5467 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5468 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f11780 gate 1578074197494283000 evaluation starts
[5469 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f11780 signed by 0 principal evaluation starts (used [false])
[546a 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f11780 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[546b 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f11780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[546c 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f11780 principal evaluation fails
[546d 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f11780 gate 1578074197494283000 evaluation fails
[546e 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[546f 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5470 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5471 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5472 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5473 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5474 01-03 17:56:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24080 gate 1578074197498355900 evaluation starts
[5475 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24080 signed by 0 principal evaluation starts (used [false])
[5476 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24080 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5477 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24080 principal evaluation succeeds for identity 0
[5478 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f24080 gate 1578074197498355900 evaluation succeeds
[5479 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[547a 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[547b 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[547c 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[547d 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[547e 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[547f 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5480 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5481 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5482 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5483 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5484 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5485 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5486 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5487 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5488 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5489 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[548a 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[548b 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32a90 gate 1578074197507207700 evaluation starts
[548c 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32a90 signed by 0 principal evaluation starts (used [false])
[548d 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32a90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[548e 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[548f 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32a90 principal evaluation fails
[5490 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f32a90 gate 1578074197507207700 evaluation fails
[5491 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5492 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5493 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5494 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5495 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5496 01-03 17:56:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5497 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f33390 gate 1578074197510039800 evaluation starts
[5498 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f33390 signed by 0 principal evaluation starts (used [false])
[5499 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f33390 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[549a 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f33390 principal evaluation succeeds for identity 0
[549b 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f33390 gate 1578074197510039800 evaluation succeeds
[549c 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[549d 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[549e 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[549f 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[54a0 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[54a1 01-03 17:56:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[54a2 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54a3 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54a4 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[54a5 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[54a6 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[54a7 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[54a8 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[54a9 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[54aa 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[54ab 01-03 17:56:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[54ac 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[54ad 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f474a0 gate 1578074197535294300 evaluation starts
[54ae 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f474a0 signed by 0 principal evaluation starts (used [false])
[54af 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f474a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[54b0 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f474a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[54b1 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f474a0 principal evaluation fails
[54b2 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f474a0 gate 1578074197535294300 evaluation fails
[54b3 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[54b4 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[54b5 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[54b6 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[54b7 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[54b8 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[54b9 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f47da0 gate 1578074197539411800 evaluation starts
[54ba 01-03 17:56:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f47da0 signed by 0 principal evaluation starts (used [false])
[54bb 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f47da0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[54bc 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f47da0 principal evaluation succeeds for identity 0
[54bd 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54be 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54bf 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[54c0 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54c1 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54c2 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14941459957451685097 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[54c3 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14941459957451685097 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[54c4 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54c5 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f47da0 gate 1578074197539411800 evaluation succeeds
[54c6 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[54c7 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[54c8 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[54c9 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[54ca 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[54cb 01-03 17:56:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[54cc 01-03 17:56:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54cd 01-03 17:56:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14941459957451685097 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[54ce 01-03 17:56:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14941459957451685097 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[54cf 01-03 17:56:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54d0 01-03 17:56:37.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[54d1 01-03 17:56:37.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54d2 01-03 17:56:37.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54d3 01-03 17:56:37.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54d4 01-03 17:56:37.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5243764876588950896 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[54d5 01-03 17:56:37.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5243764876588950896 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[54d6 01-03 17:56:37.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[54d7 01-03 17:56:37.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54d8 01-03 17:56:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[54d9 01-03 17:56:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[54da 01-03 17:56:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54db 01-03 17:56:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[54dc 01-03 17:56:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[54dd 01-03 17:56:38.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54de 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[54df 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[54e0 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[54e1 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[54e2 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[54e3 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[54e4 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 8b 82 9d 0e 51 35 cf a7 ef 21 6a ed 68 7d 8b |B....Q5...!j.h}.|
00000010 3d 1d c9 dd e4 96 d6 d2 08 1d 4f 94 a2 ac be b3 |=.........O.....|
[54e5 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f b8 da 37 6c f6 2a 50 4d e6 2e b9 |0D. /..7l.*PM...|
00000010 e5 94 5e ec 4d 21 a5 24 ac 2e 2d 4b 40 d5 4a 19 |..^.M!.$..-K@.J.|
00000020 18 2f 53 ba 02 20 77 9f 98 da e5 88 3a 6f 4d 0c |./S.. w.....:oM.|
00000030 96 65 15 cb a8 c1 31 c4 19 9c 38 b4 c5 14 0f be |.e....1...8.....|
00000040 2d 0b ad 45 c0 e4 |-..E..|
[54e6 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[54e7 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f805a0 gate 1578074198027093600 evaluation starts
[54e8 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f805a0 signed by 0 principal evaluation starts (used [false])
[54e9 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f805a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[54ea 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f805a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[54eb 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f805a0 principal evaluation fails
[54ec 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f805a0 gate 1578074198027093600 evaluation fails
[54ed 01-03 17:56:38.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[54ee 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[54ef 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[54f0 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 8b 82 9d 0e 51 35 cf a7 ef 21 6a ed 68 7d 8b |B....Q5...!j.h}.|
00000010 3d 1d c9 dd e4 96 d6 d2 08 1d 4f 94 a2 ac be b3 |=.........O.....|
[54f1 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f b8 da 37 6c f6 2a 50 4d e6 2e b9 |0D. /..7l.*PM...|
00000010 e5 94 5e ec 4d 21 a5 24 ac 2e 2d 4b 40 d5 4a 19 |..^.M!.$..-K@.J.|
00000020 18 2f 53 ba 02 20 77 9f 98 da e5 88 3a 6f 4d 0c |./S.. w.....:oM.|
00000030 96 65 15 cb a8 c1 31 c4 19 9c 38 b4 c5 14 0f be |.e....1...8.....|
00000040 2d 0b ad 45 c0 e4 |-..E..|
[54f2 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[54f3 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80ea0 gate 1578074198034923900 evaluation starts
[54f4 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80ea0 signed by 0 principal evaluation starts (used [false])
[54f5 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80ea0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[54f6 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80ea0 principal evaluation succeeds for identity 0
[54f7 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80ea0 gate 1578074198034923900 evaluation succeeds
[54f8 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[54f9 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[54fa 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[54fb 01-03 17:56:38.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[54fc 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[54fd 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes]}
[54fe 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67
[54ff 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67
[5500 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5501 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5502 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5503 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5504 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5505 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5506 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5507 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5508 01-03 17:56:38.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5509 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[550a 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[550b 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[550c 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[550d 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[550e 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[550f 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5510 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5511 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5512 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5513 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5514 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5515 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5516 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5517 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5518 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 a5 f9 bd 7c b5 c6 d6 29 76 57 13 a3 7c 33 e7 |....|...)vW..|3.|
00000010 c2 a5 1b 16 10 46 9e e6 29 59 e1 11 82 c4 58 ad |.....F..)Y....X.|
[5519 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 27 06 f5 5d 3a 30 b4 74 00 29 |0E.!..'..]:0.t.)|
00000010 34 c7 8a 1d 4d 0b 32 5e a0 9f 3a f3 c9 75 bf 87 |4...M.2^..:..u..|
00000020 20 5a 08 0d 5c 02 20 37 55 c9 26 53 b0 b7 34 33 | Z..\. 7U.&S..43|
00000030 74 24 16 36 0a b0 09 b8 0c 6a f7 ab 7c b1 dd ba |t$.6.....j..|...|
00000040 46 4e a8 28 33 7d f9 |FN.(3}.|
[551a 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[551b 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0830 gate 1578074198074152000 evaluation starts
[551c 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0830 signed by 0 principal evaluation starts (used [false])
[551d 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0830 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[551e 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[551f 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0830 principal evaluation fails
[5520 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0830 gate 1578074198074152000 evaluation fails
[5521 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5522 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5523 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5524 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 a5 f9 bd 7c b5 c6 d6 29 76 57 13 a3 7c 33 e7 |....|...)vW..|3.|
00000010 c2 a5 1b 16 10 46 9e e6 29 59 e1 11 82 c4 58 ad |.....F..)Y....X.|
[5525 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 27 06 f5 5d 3a 30 b4 74 00 29 |0E.!..'..]:0.t.)|
00000010 34 c7 8a 1d 4d 0b 32 5e a0 9f 3a f3 c9 75 bf 87 |4...M.2^..:..u..|
00000020 20 5a 08 0d 5c 02 20 37 55 c9 26 53 b0 b7 34 33 | Z..\. 7U.&S..43|
00000030 74 24 16 36 0a b0 09 b8 0c 6a f7 ab 7c b1 dd ba |t$.6.....j..|...|
00000040 46 4e a8 28 33 7d f9 |FN.(3}.|
[5526 01-03 17:56:38.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5527 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa1130 gate 1578074198081602600 evaluation starts
[5528 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa1130 signed by 0 principal evaluation starts (used [false])
[5529 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa1130 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[552a 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa1130 principal evaluation succeeds for identity 0
[552b 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa1130 gate 1578074198081602600 evaluation succeeds
[552c 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[552d 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[552e 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[552f 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5530 01-03 17:56:38.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5531 01-03 17:56:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes]}
[5532 01-03 17:56:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5533 01-03 17:56:38.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5534 01-03 17:56:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5535 01-03 17:56:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69
[5536 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69
[5537 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:68 , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership
[5538 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5539 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[553a 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553b 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553c 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553d 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553e 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553f 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5540 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5541 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5542 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5543 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5544 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5545 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5546 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5547 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5548 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5549 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[554a 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[554b 01-03 17:56:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[554c 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[554d 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[554e 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[554f 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5550 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5551 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5552 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5553 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5554 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5555 01-03 17:56:38.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5556 01-03 17:56:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5559 01-03 17:56:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[555a 01-03 17:56:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5557 01-03 17:56:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5558 01-03 17:56:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[555d 01-03 17:56:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[555b 01-03 17:56:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[555c 01-03 17:56:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[555e 01-03 17:56:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[555f 01-03 17:56:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[5560 01-03 17:56:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5561 01-03 17:56:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5562 01-03 17:56:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5563 01-03 17:56:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5564 01-03 17:56:38.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[5565 01-03 17:56:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151042
[5566 01-03 17:56:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2DCB7D18159059BBBF67E6F9E177943E303B9D5637BB86BB635A5085895AE879
[5567 01-03 17:56:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5568 01-03 17:56:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5569 01-03 17:56:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[556a 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[556b 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[556c 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[556d 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[556e 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[556f 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[5570 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5571 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5572 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5573 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5574 01-03 17:56:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5575 01-03 17:56:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5576 01-03 17:56:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5577 01-03 17:56:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[5578 01-03 17:56:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[5579 01-03 17:56:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[557a 01-03 17:56:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[557b 01-03 17:56:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[557c 01-03 17:56:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[557d 01-03 17:56:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:13853523903365102309 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[557e 01-03 17:56:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13853523903365102309 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[557f 01-03 17:56:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5580 01-03 17:56:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5581 01-03 17:56:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5582 01-03 17:56:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5583 01-03 17:56:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5584 01-03 17:56:39.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5585 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 9e ca 1d 80 62 43 6d 8a 7b 5c 43 cc dd 6d 7f |o....bCm.{\C..m.|
00000010 3e 9f b8 89 03 1f 93 ee a1 1e eb de d6 09 c3 a8 |>...............|
[5586 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c be 34 7b 6b e0 cb 10 4b c5 95 d3 |0D. |.4{k...K...|
00000010 ce 5a 36 c7 74 26 81 8b a2 45 ca 85 0f 6d 99 09 |.Z6.t&...E...m..|
00000020 3c 80 61 72 02 20 3d e8 3f 16 83 6d cc 28 ff f3 |<.ar. =.?..m.(..|
00000030 59 1e 12 30 26 bb c4 cb a1 5c b1 ad 63 c0 38 e3 |Y..0&....\..c.8.|
00000040 bb 56 1c a5 2f 20 |.V../ |
[5587 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5588 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae cf ae 71 f4 de d1 70 00 ac a0 |0E.!....q...p...|
00000010 6c e8 f7 56 27 19 a0 51 65 a6 e1 18 53 11 e3 6a |l..V'..Qe...S..j|
00000020 d5 e1 12 d9 6b 02 20 3b 8d f3 7e 60 b7 89 64 3c |....k. ;..~`..d<|
00000030 42 f6 33 99 2a 14 66 7a 7d 22 e6 47 81 02 a3 fd |B.3.*.fz}".G....|
00000040 94 52 ec 33 1f fe 07 |.R.3...|
[5589 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[558a 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[558b 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70
[558c 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70
[558d 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[558e 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[558f 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5590 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5591 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5592 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5593 01-03 17:56:39.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5594 01-03 17:56:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[5595 01-03 17:56:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[5596 01-03 17:56:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[5597 01-03 17:56:39.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5598 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5327556551343009434 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5599 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:5327556551343009434 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[559a 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5327556551343009434 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[559b 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[559c 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[559d 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[559e 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[559f 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55a0 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55a1 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[55a2 01-03 17:56:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55a3 01-03 17:56:41.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:7139213275114094790 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[55a4 01-03 17:56:41.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:7139213275114094790 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[55a5 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7139213275114094790 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[55a6 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55a7 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55a8 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55a9 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55aa 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55ab 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55ac 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[55ad 01-03 17:56:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55ae 01-03 17:56:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[55af 01-03 17:56:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[55b0 01-03 17:56:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55b1 01-03 17:56:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[55b2 01-03 17:56:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[55b3 01-03 17:56:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55b4 01-03 17:56:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[55b5 01-03 17:56:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[55b6 01-03 17:56:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[55b7 01-03 17:56:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[55b8 01-03 17:56:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[55b9 01-03 17:56:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[55ba 01-03 17:56:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 38 6c cf b1 6c 51 63 88 7d 21 2b 79 a9 07 51 |.8l..lQc.}!+y..Q|
00000010 e7 5e 39 e5 03 84 08 26 47 f6 2d 47 5c 8a 6f ee |.^9....&G.-G\.o.|
[55bb 01-03 17:56:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 33 e1 d5 0c 5b 0d 07 59 94 ac ec |0D. x3...[..Y...|
00000010 86 8f ad 3e 2d 5b 45 e1 82 7e f3 34 5f a2 58 d5 |...>-[E..~.4_.X.|
00000020 70 89 9c 08 02 20 00 c2 3c 9c 11 9c f1 b5 7a fd |p.... ..<.....z.|
00000030 47 1c c1 cc 11 d3 41 74 11 05 1a 6a 05 79 f1 2f |G.....At...j.y./|
00000040 a1 ff df d4 9a 86 |......|
[55bc 01-03 17:56:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[55bd 01-03 17:56:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[55be 01-03 17:56:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[55bf 01-03 17:56:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305c6d0 gate 1578074201180799100 evaluation starts
[55c0 01-03 17:56:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305c6d0 signed by 0 principal evaluation starts (used [false])
[55c1 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305c6d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[55c2 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305c6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[55c3 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305c6d0 principal evaluation fails
[55c4 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305c6d0 gate 1578074201180799100 evaluation fails
[55c5 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[55c6 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[55c7 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[55c8 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 38 6c cf b1 6c 51 63 88 7d 21 2b 79 a9 07 51 |.8l..lQc.}!+y..Q|
00000010 e7 5e 39 e5 03 84 08 26 47 f6 2d 47 5c 8a 6f ee |.^9....&G.-G\.o.|
[55c9 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 33 e1 d5 0c 5b 0d 07 59 94 ac ec |0D. x3...[..Y...|
00000010 86 8f ad 3e 2d 5b 45 e1 82 7e f3 34 5f a2 58 d5 |...>-[E..~.4_.X.|
00000020 70 89 9c 08 02 20 00 c2 3c 9c 11 9c f1 b5 7a fd |p.... ..<.....z.|
00000030 47 1c c1 cc 11 d3 41 74 11 05 1a 6a 05 79 f1 2f |G.....At...j.y./|
00000040 a1 ff df d4 9a 86 |......|
[55ca 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[55cb 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305cfd0 gate 1578074201214958700 evaluation starts
[55cc 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305cfd0 signed by 0 principal evaluation starts (used [false])
[55cd 01-03 17:56:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305cfd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[55ce 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305cfd0 principal evaluation succeeds for identity 0
[55cf 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305cfd0 gate 1578074201214958700 evaluation succeeds
[55d0 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[55d1 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[55d2 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[55d3 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[55d4 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[55d5 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes]}
[55d6 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70
[55d7 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70
[55d8 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[55d9 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55da 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55db 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55dc 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[55dd 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[55de 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55df 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[55e0 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[55e1 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[55e2 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[55e3 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[55e4 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[55e5 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 b7 d6 25 d9 b2 07 eb 32 43 b0 12 c5 63 4c 73 |...%....2C...cLs|
00000010 fd fe 7a 87 83 b8 43 de 0e 25 0d 18 91 74 e5 4f |..z...C..%...t.O|
[55e6 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd bd 36 81 ff 11 82 06 f5 21 d5 |0E.!...6......!.|
00000010 2a c7 eb b6 d9 80 72 89 7d a6 5a ab 7b cd 6d 98 |*.....r.}.Z.{.m.|
00000020 4d bc 43 41 7f 02 20 54 5a 5b f4 a3 85 82 5f e8 |M.CA.. TZ[...._.|
00000030 37 47 b0 ea 58 52 9e b4 d3 98 11 1f 8d b5 c8 4d |7G..XR.........M|
00000040 2c 33 91 ea bc 2e 98 |,3.....|
[55e7 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[55e8 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030733a0 gate 1578074201221486200 evaluation starts
[55e9 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030733a0 signed by 0 principal evaluation starts (used [false])
[55ea 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030733a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[55eb 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030733a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[55ec 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030733a0 principal evaluation fails
[55ed 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030733a0 gate 1578074201221486200 evaluation fails
[55ee 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[55ef 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55f0 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55f1 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55f2 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[55f3 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[55f4 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[55f5 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55f6 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55f7 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[55f8 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[55f9 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[55fa 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 b7 d6 25 d9 b2 07 eb 32 43 b0 12 c5 63 4c 73 |...%....2C...cLs|
00000010 fd fe 7a 87 83 b8 43 de 0e 25 0d 18 91 74 e5 4f |..z...C..%...t.O|
[55fb 01-03 17:56:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd bd 36 81 ff 11 82 06 f5 21 d5 |0E.!...6......!.|
00000010 2a c7 eb b6 d9 80 72 89 7d a6 5a ab 7b cd 6d 98 |*.....r.}.Z.{.m.|
00000020 4d bc 43 41 7f 02 20 54 5a 5b f4 a3 85 82 5f e8 |M.CA.. TZ[...._.|
00000030 37 47 b0 ea 58 52 9e b4 d3 98 11 1f 8d b5 c8 4d |7G..XR.........M|
00000040 2c 33 91 ea bc 2e 98 |,3.....|
[55fc 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[55fd 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003073d50 gate 1578074201238102300 evaluation starts
[55fe 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003073d50 signed by 0 principal evaluation starts (used [false])
[55ff 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003073d50 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5600 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003073d50 principal evaluation succeeds for identity 0
[5601 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003073d50 gate 1578074201238102300 evaluation succeeds
[5602 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5603 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5604 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5605 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5606 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes
[5607 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes]}
[5608 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68
[5609 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68
[560a 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[560b 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[560c 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[560d 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[560e 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[560f 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5610 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5611 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5612 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[5613 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5614 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5615 01-03 17:56:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5616 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[5617 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2100803865970602227 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5618 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[5619 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:18084684903283225582 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[561a 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[561b 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:654941831891082420 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[561d 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:18084684903283225582 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[561f 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[561e 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:654941831891082420 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5620 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[561c 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2100803865970602227 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5621 01-03 17:56:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5622 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18084684903283225582 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[5624 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18084684903283225582 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[5625 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5623 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2100803865970602227 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[5626 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2100803865970602227 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[5627 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2100803865970602227 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[5628 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5629 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 654941831891082420 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[562a 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 654941831891082420 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[562b 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 654941831891082420 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[562c 01-03 17:56:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[562d 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151043
[562e 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 547369C27E49E785864B8D7E5AA9F2F3AB270869420882FAB2CF13D7C1DE9203
[562f 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5630 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5631 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5632 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[5633 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5634 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[5635 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5636 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5637 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5638 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5639 01-03 17:56:41.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[563a 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[563b 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[563c 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[563d 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[563e 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[563f 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5640 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5641 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5642 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5643 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5644 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5645 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5646 01-03 17:56:41.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5647 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5648 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 38 6c cf b1 6c 51 63 88 7d 21 2b 79 a9 07 51 |.8l..lQc.}!+y..Q|
00000010 e7 5e 39 e5 03 84 08 26 47 f6 2d 47 5c 8a 6f ee |.^9....&G.-G\.o.|
[5649 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 33 e1 d5 0c 5b 0d 07 59 94 ac ec |0D. x3...[..Y...|
00000010 86 8f ad 3e 2d 5b 45 e1 82 7e f3 34 5f a2 58 d5 |...>-[E..~.4_.X.|
00000020 70 89 9c 08 02 20 00 c2 3c 9c 11 9c f1 b5 7a fd |p.... ..<.....z.|
00000030 47 1c c1 cc 11 d3 41 74 11 05 1a 6a 05 79 f1 2f |G.....At...j.y./|
00000040 a1 ff df d4 9a 86 |......|
[564a 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[564b 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dd6a0 gate 1578074201360787000 evaluation starts
[564c 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dd6a0 signed by 0 principal evaluation starts (used [false])
[564d 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dd6a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[564e 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dd6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[564f 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dd6a0 principal evaluation fails
[5650 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030dd6a0 gate 1578074201360787000 evaluation fails
[5651 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5652 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5653 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5654 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 38 6c cf b1 6c 51 63 88 7d 21 2b 79 a9 07 51 |.8l..lQc.}!+y..Q|
00000010 e7 5e 39 e5 03 84 08 26 47 f6 2d 47 5c 8a 6f ee |.^9....&G.-G\.o.|
[5655 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 33 e1 d5 0c 5b 0d 07 59 94 ac ec |0D. x3...[..Y...|
00000010 86 8f ad 3e 2d 5b 45 e1 82 7e f3 34 5f a2 58 d5 |...>-[E..~.4_.X.|
00000020 70 89 9c 08 02 20 00 c2 3c 9c 11 9c f1 b5 7a fd |p.... ..<.....z.|
00000030 47 1c c1 cc 11 d3 41 74 11 05 1a 6a 05 79 f1 2f |G.....At...j.y./|
00000040 a1 ff df d4 9a 86 |......|
[5656 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5657 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ddfa0 gate 1578074201362210100 evaluation starts
[5658 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ddfa0 signed by 0 principal evaluation starts (used [false])
[5659 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ddfa0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[565a 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ddfa0 principal evaluation succeeds for identity 0
[565b 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ddfa0 gate 1578074201362210100 evaluation succeeds
[565c 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[565d 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[565e 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[565f 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5660 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5661 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5662 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5663 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 9e ca 1d 80 62 43 6d 8a 7b 5c 43 cc dd 6d 7f |o....bCm.{\C..m.|
00000010 3e 9f b8 89 03 1f 93 ee a1 1e eb de d6 09 c3 a8 |>...............|
[5664 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c be 34 7b 6b e0 cb 10 4b c5 95 d3 |0D. |.4{k...K...|
00000010 ce 5a 36 c7 74 26 81 8b a2 45 ca 85 0f 6d 99 09 |.Z6.t&...E...m..|
00000020 3c 80 61 72 02 20 3d e8 3f 16 83 6d cc 28 ff f3 |<.ar. =.?..m.(..|
00000030 59 1e 12 30 26 bb c4 cb a1 5c b1 ad 63 c0 38 e3 |Y..0&....\..c.8.|
00000040 bb 56 1c a5 2f 20 |.V../ |
[5665 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5666 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5667 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5668 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 73 69 c2 7e 49 e7 85 86 4b 8d 7e 5a a9 f2 f3 |Tsi.~I...K.~Z...|
00000010 ab 27 08 69 42 08 82 fa b2 cf 13 d7 c1 de 92 03 |.'.iB...........|
[5669 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 dd 82 5b 4e e3 ac 70 ec 97 13 |0E.!....[N..p...|
00000010 19 47 34 91 11 fd 1b ed 98 c2 02 32 78 44 32 fb |.G4........2xD2.|
00000020 79 3c 40 0c 6b 02 20 23 36 b0 53 64 9d b4 6d ee |y<@.k. #6.Sd..m.|
00000030 90 70 40 97 1b 6a c4 31 28 a4 e7 81 59 61 52 b1 |.p@..j.1(...YaR.|
00000040 22 e5 19 ae a9 62 27 |"....b'|
[566a 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[566b 01-03 17:56:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[566c 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[566d 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[566e 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[566f 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5670 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5671 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5672 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 9e ca 1d 80 62 43 6d 8a 7b 5c 43 cc dd 6d 7f |o....bCm.{\C..m.|
00000010 3e 9f b8 89 03 1f 93 ee a1 1e eb de d6 09 c3 a8 |>...............|
[5673 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c be 34 7b 6b e0 cb 10 4b c5 95 d3 |0D. |.4{k...K...|
00000010 ce 5a 36 c7 74 26 81 8b a2 45 ca 85 0f 6d 99 09 |.Z6.t&...E...m..|
00000020 3c 80 61 72 02 20 3d e8 3f 16 83 6d cc 28 ff f3 |<.ar. =.?..m.(..|
00000030 59 1e 12 30 26 bb c4 cb a1 5c b1 ad 63 c0 38 e3 |Y..0&....\..c.8.|
00000040 bb 56 1c a5 2f 20 |.V../ |
[5674 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5675 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5676 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5677 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5678 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5679 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[567a 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[567b 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[567c 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[567d 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[567e 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 b7 d6 25 d9 b2 07 eb 32 43 b0 12 c5 63 4c 73 |...%....2C...cLs|
00000010 fd fe 7a 87 83 b8 43 de 0e 25 0d 18 91 74 e5 4f |..z...C..%...t.O|
[567f 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd bd 36 81 ff 11 82 06 f5 21 d5 |0E.!...6......!.|
00000010 2a c7 eb b6 d9 80 72 89 7d a6 5a ab 7b cd 6d 98 |*.....r.}.Z.{.m.|
00000020 4d bc 43 41 7f 02 20 54 5a 5b f4 a3 85 82 5f e8 |M.CA.. TZ[...._.|
00000030 37 47 b0 ea 58 52 9e b4 d3 98 11 1f 8d b5 c8 4d |7G..XR.........M|
00000040 2c 33 91 ea bc 2e 98 |,3.....|
[5680 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5681 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003189b80 gate 1578074201398198200 evaluation starts
[5682 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003189b80 signed by 0 principal evaluation starts (used [false])
[5683 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003189b80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5684 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003189b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5685 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003189b80 principal evaluation fails
[5686 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003189b80 gate 1578074201398198200 evaluation fails
[5687 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5688 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5689 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[568a 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 b7 d6 25 d9 b2 07 eb 32 43 b0 12 c5 63 4c 73 |...%....2C...cLs|
00000010 fd fe 7a 87 83 b8 43 de 0e 25 0d 18 91 74 e5 4f |..z...C..%...t.O|
[568b 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd bd 36 81 ff 11 82 06 f5 21 d5 |0E.!...6......!.|
00000010 2a c7 eb b6 d9 80 72 89 7d a6 5a ab 7b cd 6d 98 |*.....r.}.Z.{.m.|
00000020 4d bc 43 41 7f 02 20 54 5a 5b f4 a3 85 82 5f e8 |M.CA.. TZ[...._.|
00000030 37 47 b0 ea 58 52 9e b4 d3 98 11 1f 8d b5 c8 4d |7G..XR.........M|
00000040 2c 33 91 ea bc 2e 98 |,3.....|
[568c 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[568d 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198480 gate 1578074201399436000 evaluation starts
[568f 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198480 signed by 0 principal evaluation starts (used [false])
[5690 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198480 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5691 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198480 principal evaluation succeeds for identity 0
[5692 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198480 gate 1578074201399436000 evaluation succeeds
[5693 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5694 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5695 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5696 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5697 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes
[5698 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5699 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[569a 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 73 69 c2 7e 49 e7 85 86 4b 8d 7e 5a a9 f2 f3 |Tsi.~I...K.~Z...|
00000010 ab 27 08 69 42 08 82 fa b2 cf 13 d7 c1 de 92 03 |.'.iB...........|
[569b 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 dd 82 5b 4e e3 ac 70 ec 97 13 |0E.!....[N..p...|
00000010 19 47 34 91 11 fd 1b ed 98 c2 02 32 78 44 32 fb |.G4........2xD2.|
00000020 79 3c 40 0c 6b 02 20 23 36 b0 53 64 9d b4 6d ee |y<@.k. #6.Sd..m.|
00000030 90 70 40 97 1b 6a c4 31 28 a4 e7 81 59 61 52 b1 |.p@..j.1(...YaR.|
00000040 22 e5 19 ae a9 62 27 |"....b'|
[569c 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[569d 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[569e 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[569f 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[568e 01-03 17:56:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56a0 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[56a1 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56a2 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[56a3 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[56a4 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 73 69 c2 7e 49 e7 85 86 4b 8d 7e 5a a9 f2 f3 |Tsi.~I...K.~Z...|
00000010 ab 27 08 69 42 08 82 fa b2 cf 13 d7 c1 de 92 03 |.'.iB...........|
[56a5 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 dd 82 5b 4e e3 ac 70 ec 97 13 |0E.!....[N..p...|
00000010 19 47 34 91 11 fd 1b ed 98 c2 02 32 78 44 32 fb |.G4........2xD2.|
00000020 79 3c 40 0c 6b 02 20 23 36 b0 53 64 9d b4 6d ee |y<@.k. #6.Sd..m.|
00000030 90 70 40 97 1b 6a c4 31 28 a4 e7 81 59 61 52 b1 |.p@..j.1(...YaR.|
00000040 22 e5 19 ae a9 62 27 |"....b'|
[56a6 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[56a7 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 4d ff 0c 8c 01 65 b4 39 90 b3 3f |0D. .M....e.9..?|
00000010 9d 2e 8c d9 59 32 7b 40 bc 82 18 7a 2b 93 fb 03 |....Y2{@...z+...|
00000020 db f3 31 87 02 20 35 14 32 3d 88 83 a9 1b c6 9c |..1.. 5.2=......|
00000030 bd b5 3a 76 1a 2a da f4 3e ea c1 50 71 24 60 ac |..:v.*..>..Pq$`.|
00000040 54 83 91 46 9c 9b |T..F..|
[56a8 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[56a9 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[56aa 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56ab 01-03 17:56:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56ac 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56ad 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56ae 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[56af 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[56b0 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56b1 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[56b2 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56b3 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[56b4 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56b5 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[56b6 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[56b7 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[56b8 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[56b9 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[56ba 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56bb 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56bc 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[56bd 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[56be 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[56bf 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[56c0 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[56c1 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[56c2 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[56c3 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[56c4 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[56c5 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[56c6 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56c7 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8d80 gate 1578074201419100900 evaluation starts
[56c8 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8d80 signed by 0 principal evaluation starts (used [false])
[56c9 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8d80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[56ca 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[56cb 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8d80 principal evaluation fails
[56cc 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e8d80 gate 1578074201419100900 evaluation fails
[56cd 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[56ce 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[56cf 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[56d0 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[56d1 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[56d2 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56d3 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e9680 gate 1578074201419705300 evaluation starts
[56d4 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e9680 signed by 0 principal evaluation starts (used [false])
[56d5 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e9680 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[56d6 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e9680 principal evaluation succeeds for identity 0
[56d7 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e9680 gate 1578074201419705300 evaluation succeeds
[56d8 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[56d9 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[56da 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[56db 01-03 17:56:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[56dc 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56dd 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56de 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[56df 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[56e0 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[56e1 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[56e2 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[56e3 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[56e4 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[56e5 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[56e6 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56e7 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032090e0 gate 1578074201420604400 evaluation starts
[56e8 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032090e0 signed by 0 principal evaluation starts (used [false])
[56e9 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032090e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[56ea 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032090e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[56eb 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032090e0 principal evaluation fails
[56ec 01-03 17:56:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032090e0 gate 1578074201420604400 evaluation fails
[56ed 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[56ee 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[56ef 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510181801
[56f0 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A86E655B93A1BCC3FC862096BF9541AAC37C23338030DD05A7FD162A3D869426
[56f1 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[56f2 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56f3 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56f4 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56f5 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56f6 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:24 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[56f7 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56f8 01-03 17:56:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56f9 01-03 17:56:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:24 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[56fa 01-03 17:56:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56fb 01-03 17:56:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[56fc 01-03 17:56:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[56fd 01-03 17:56:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[56fe 01-03 17:56:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[56ff 01-03 17:56:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5700 01-03 17:56:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5701 01-03 17:56:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032099e0 gate 1578074201513074800 evaluation starts
[5702 01-03 17:56:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032099e0 signed by 0 principal evaluation starts (used [false])
[5703 01-03 17:56:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032099e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5704 01-03 17:56:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032099e0 principal evaluation succeeds for identity 0
[5705 01-03 17:56:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032099e0 gate 1578074201513074800 evaluation succeeds
[5706 01-03 17:56:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5707 01-03 17:56:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5708 01-03 17:56:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5709 01-03 17:56:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[570a 01-03 17:56:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[570b 01-03 17:56:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[570c 01-03 17:56:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[570d 01-03 17:56:41.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[570e 01-03 17:56:41.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[570f 01-03 17:56:41.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5710 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5712 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5713 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5714 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5715 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5716 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5717 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5718 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5719 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322f9f0 gate 1578074201555446900 evaluation starts
[571a 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322f9f0 signed by 0 principal evaluation starts (used [false])
[571b 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322f9f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[571c 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322f9f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[571d 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322f9f0 principal evaluation fails
[571e 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322f9f0 gate 1578074201555446900 evaluation fails
[571f 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5711 01-03 17:56:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5720 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5721 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5722 01-03 17:56:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5723 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5724 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5725 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266320 gate 1578074201561541000 evaluation starts
[5726 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266320 signed by 0 principal evaluation starts (used [false])
[5727 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266320 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5728 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266320 principal evaluation succeeds for identity 0
[5729 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003266320 gate 1578074201561541000 evaluation succeeds
[572a 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[572b 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[572c 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[572d 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[572e 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[572f 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[5730 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5731 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5732 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5733 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5734 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5735 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5736 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5737 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5738 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5739 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[573a 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[573b 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003278430 gate 1578074201567344200 evaluation starts
[573c 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003278430 signed by 0 principal evaluation starts (used [false])
[573d 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003278430 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[573e 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003278430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[573f 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003278430 principal evaluation fails
[5740 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5741 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[5742 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5743 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5744 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6606097301213377993 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[5745 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6606097301213377993 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5746 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5747 01-03 17:56:41.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003278430 gate 1578074201567344200 evaluation fails
[5748 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5749 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[574a 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[574b 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[574c 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[574d 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[574e 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279420 gate 1578074201570958400 evaluation starts
[574f 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279420 signed by 0 principal evaluation starts (used [false])
[5750 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279420 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5751 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279420 principal evaluation succeeds for identity 0
[5752 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279420 gate 1578074201570958400 evaluation succeeds
[5753 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5754 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5755 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5756 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5757 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[5758 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5759 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[575a 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[575b 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[575c 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[575d 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[575e 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[575f 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5760 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5761 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5762 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5763 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5764 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5765 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5766 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5767 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a17e0 gate 1578074201575930400 evaluation starts
[5768 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a17e0 signed by 0 principal evaluation starts (used [false])
[5769 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a17e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[576a 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a17e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[576b 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a17e0 principal evaluation fails
[576c 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a17e0 gate 1578074201575930400 evaluation fails
[576d 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[576e 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[576f 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5770 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5771 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5772 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5773 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b00e0 gate 1578074201577021200 evaluation starts
[5774 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b00e0 signed by 0 principal evaluation starts (used [false])
[5775 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b00e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5776 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b00e0 principal evaluation succeeds for identity 0
[5777 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b00e0 gate 1578074201577021200 evaluation succeeds
[5778 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5779 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[577a 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[577b 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[577c 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[577d 01-03 17:56:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[577e 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[577f 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5780 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5781 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5782 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5783 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5784 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5785 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5786 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5787 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5788 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5789 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[578a 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[578b 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ce8a0 gate 1578074201583482300 evaluation starts
[578c 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ce8a0 signed by 0 principal evaluation starts (used [false])
[578d 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ce8a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[578e 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ce8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[578f 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ce8a0 principal evaluation fails
[5790 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ce8a0 gate 1578074201583482300 evaluation fails
[5791 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5792 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5793 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5794 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5795 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5796 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5797 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf1a0 gate 1578074201584861700 evaluation starts
[5798 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf1a0 signed by 0 principal evaluation starts (used [false])
[5799 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf1a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[579a 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf1a0 principal evaluation succeeds for identity 0
[579b 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cf1a0 gate 1578074201584861700 evaluation succeeds
[579c 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[579d 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[579e 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[579f 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[57a0 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57a1 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6606097301213377993 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[57a2 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6606097301213377993 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[57a3 01-03 17:56:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57a4 01-03 17:56:41.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[57a5 01-03 17:56:41.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57a6 01-03 17:56:41.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57a7 01-03 17:56:41.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57a8 01-03 17:56:41.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[57a9 01-03 17:56:41.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57aa 01-03 17:56:41.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[57ab 01-03 17:56:41.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[57ac 01-03 17:56:41.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 b7 d9 ef 92 3d 0e e3 1c 5a ae 3a b6 ef 17 75 |.....=...Z.:...u|
00000010 bd 64 9b ab 8b 03 30 ca cf 40 9a 4c f0 f2 d0 33 |.d....0..@.L...3|
[57ad 01-03 17:56:41.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 88 9e f2 29 46 9a b9 c8 fd 8f 23 |0D. K...)F.....#|
00000010 b4 09 74 a4 15 4d 5f 0f e3 9c ee 56 fd 43 4e 10 |..t..M_....V.CN.|
00000020 67 40 f6 f9 02 20 19 b9 6a 69 ff ee f6 fd 2b c8 |g@... ..ji....+.|
00000030 30 a4 94 78 7d cf f4 02 11 4d 90 e9 f3 0c 1a ca |0..x}....M......|
00000040 e1 52 d8 c5 ad 28 |.R...(|
[57ae 01-03 17:56:41.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[57af 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 1c 2d 56 27 df 06 13 3c f9 88 05 |0D. v.-V'...<...|
00000010 34 22 e2 84 6f b5 44 bf 5e 77 3d 22 30 dd 9c a9 |4"..o.D.^w="0...|
00000020 54 8e 5a 61 02 20 7c 1b 1d 9a e5 2a 97 3a 3a 8f |T.Za. |....*.::.|
00000030 82 a0 ea d5 f5 61 9e 92 98 c4 07 2f e7 8c 7a 1b |.....a...../..z.|
00000040 07 9e 9a 20 50 7d |... P}|
[57b0 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[57b1 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[57b2 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71
[57b3 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71
[57b4 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[57b5 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57b6 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57b7 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12306167401014158610 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[57b8 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12306167401014158610 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[57b9 01-03 17:56:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57ba 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[57bb 01-03 17:56:41.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[57bc 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57bd 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57be 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57bf 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57c0 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[57c1 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57c2 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[57c3 01-03 17:56:41.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[57c4 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57c5 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[57c6 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57c7 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[57c8 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[57c9 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[57ca 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57cb 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57cc 01-03 17:56:41.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[57cd 01-03 17:56:41.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57ce 01-03 17:56:41.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[57cf 01-03 17:56:41.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57d0 01-03 17:56:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[57d1 01-03 17:56:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[57d2 01-03 17:56:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57d3 01-03 17:56:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57d4 01-03 17:56:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57d5 01-03 17:56:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57d6 01-03 17:56:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[57d7 01-03 17:56:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[57d8 01-03 17:56:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57d9 01-03 17:56:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57da 01-03 17:56:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57db 01-03 17:56:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57dc 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[57dd 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[57de 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57df 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[57e0 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[57e1 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57e2 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[57e3 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[57e4 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[57e5 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[57e6 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[57e7 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[57e8 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 9c 15 94 fb 8e 0d c2 c6 f4 2c 8b f7 38 09 05 |D.........,..8..|
00000010 53 fb 3c fa 18 37 df 76 92 7a 57 3d b0 4f a9 7a |S.<..7.v.zW=.O.z|
[57e9 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8f e5 23 30 16 29 bf fb f7 0d |0E.!....#0.)....|
00000010 e2 56 c4 cb 3c 79 17 f8 a6 23 6d 90 2a 42 9a 32 |.V..<y...#m.*B.2|
00000020 3f 8d 45 4e 4f 02 20 08 8d 63 91 e2 ec 19 9d 78 |?.ENO. ..c.....x|
00000030 40 72 89 86 14 70 54 17 ca 42 f4 38 e6 b6 26 a8 |@r...pT..B.8..&.|
00000040 55 80 a7 4f e8 db f6 |U..O...|
[57ea 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[57eb 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333ed00 gate 1578074202998508300 evaluation starts
[57ec 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333ed00 signed by 0 principal evaluation starts (used [false])
[57ed 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333ed00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[57ee 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333ed00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[57ef 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333ed00 principal evaluation fails
[57f0 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333ed00 gate 1578074202998508300 evaluation fails
[57f1 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[57f2 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[57f3 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[57f4 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 9c 15 94 fb 8e 0d c2 c6 f4 2c 8b f7 38 09 05 |D.........,..8..|
00000010 53 fb 3c fa 18 37 df 76 92 7a 57 3d b0 4f a9 7a |S.<..7.v.zW=.O.z|
[57f5 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8f e5 23 30 16 29 bf fb f7 0d |0E.!....#0.)....|
00000010 e2 56 c4 cb 3c 79 17 f8 a6 23 6d 90 2a 42 9a 32 |.V..<y...#m.*B.2|
00000020 3f 8d 45 4e 4f 02 20 08 8d 63 91 e2 ec 19 9d 78 |?.ENO. ..c.....x|
00000030 40 72 89 86 14 70 54 17 ca 42 f4 38 e6 b6 26 a8 |@r...pT..B.8..&.|
00000040 55 80 a7 4f e8 db f6 |U..O...|
[57f6 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[57f7 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f600 gate 1578074202999100700 evaluation starts
[57f8 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f600 signed by 0 principal evaluation starts (used [false])
[57f9 01-03 17:56:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f600 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[57fa 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f600 principal evaluation succeeds for identity 0
[57fb 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333f600 gate 1578074202999100700 evaluation succeeds
[57fc 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[57fd 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[57fe 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[57ff 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5800 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5801 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes]}
[5802 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69
[5803 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69
[5804 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5805 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5806 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5807 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5808 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5809 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[580a 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[580b 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[580c 01-03 17:56:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[580d 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[580e 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[580f 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5810 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5811 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5812 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5813 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5814 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5815 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5816 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5817 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5818 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5819 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[581a 01-03 17:56:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[581b 01-03 17:56:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[581c 01-03 17:56:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[581d 01-03 17:56:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[581e 01-03 17:56:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[581f 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5820 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5821 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5822 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5823 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5824 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5825 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5826 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5827 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5828 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5829 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[582a 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 bc e8 34 5b ff 3a 24 70 54 bc 3a e3 b3 e3 a2 |...4[.:$pT.:....|
00000010 b9 d3 f2 73 e3 62 77 b4 82 dc db a5 23 9a e4 50 |...s.bw.....#..P|
[582b 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 c9 1e 37 1f 34 16 0f 07 ca 45 1b |0D. P..7.4....E.|
00000010 4f 00 7e f6 97 75 a0 8b 01 ec c3 6e bb 98 92 83 |O.~..u.....n....|
00000020 bb a7 81 fe 02 20 10 76 56 f3 e3 f6 86 07 a4 90 |..... .vV.......|
00000030 26 01 0e 34 42 b4 23 14 49 24 c2 f9 23 2e e7 5e |&..4B.#.I$..#..^|
00000040 2e 0a ec 72 13 1a |...r..|
[582c 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[582d 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383250 gate 1578074203074379900 evaluation starts
[582e 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383250 signed by 0 principal evaluation starts (used [false])
[582f 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383250 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5830 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5831 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383250 principal evaluation fails
[5832 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383250 gate 1578074203074379900 evaluation fails
[5833 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5834 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5835 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5836 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 bc e8 34 5b ff 3a 24 70 54 bc 3a e3 b3 e3 a2 |...4[.:$pT.:....|
00000010 b9 d3 f2 73 e3 62 77 b4 82 dc db a5 23 9a e4 50 |...s.bw.....#..P|
[5837 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 c9 1e 37 1f 34 16 0f 07 ca 45 1b |0D. P..7.4....E.|
00000010 4f 00 7e f6 97 75 a0 8b 01 ec c3 6e bb 98 92 83 |O.~..u.....n....|
00000020 bb a7 81 fe 02 20 10 76 56 f3 e3 f6 86 07 a4 90 |..... .vV.......|
00000030 26 01 0e 34 42 b4 23 14 49 24 c2 f9 23 2e e7 5e |&..4B.#.I$..#..^|
00000040 2e 0a ec 72 13 1a |...r..|
[5838 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5839 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383b50 gate 1578074203075010200 evaluation starts
[583a 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383b50 signed by 0 principal evaluation starts (used [false])
[583b 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383b50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[583c 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383b50 principal evaluation succeeds for identity 0
[583d 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003383b50 gate 1578074203075010200 evaluation succeeds
[583e 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[583f 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5840 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5841 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5842 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5843 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes]}
[5844 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71
[5845 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71
[5846 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5847 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5848 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5849 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[584a 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[584b 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[584c 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[584d 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[584e 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[584f 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5850 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5851 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5852 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5853 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5854 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5855 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5856 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5857 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5858 01-03 17:56:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5859 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[585a 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[585b 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[585c 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[585d 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[585e 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[585f 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5860 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5861 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5862 01-03 17:56:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5863 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151044
[5864 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 633CD67B5DC68C43649029EC2BD29B6E1B1ED7269CF08E025BD5EF4F462DCCF3
[5865 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5866 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5867 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[5868 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5869 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[586a 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[586b 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[586c 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[586d 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[586e 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[586f 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5870 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5871 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes
[5872 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5873 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes
[5874 01-03 17:56:43.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5875 01-03 17:56:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:16045393310499851187 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5876 01-03 17:56:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16045393310499851187 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5877 01-03 17:56:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5878 01-03 17:56:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5879 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[587a 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[587b 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[587c 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[587d 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 49 ae 52 c1 a9 82 95 78 28 ac 06 6c 2f 3d 5a |%I.R....x(..l/=Z|
00000010 5a 43 36 d2 de c5 ec 1b 64 bf e9 78 bd 18 6d f4 |ZC6.....d..x..m.|
[587e 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c a1 cf 51 0e 20 2f ae 1c 6a 90 90 |0D. ,..Q. /..j..|
00000010 de 61 2e 3f 07 e7 0e ab 8f bd 9d e2 bc 35 07 e2 |.a.?.........5..|
00000020 10 6d b1 3a 02 20 7e a6 d4 21 45 c4 02 33 10 a6 |.m.:. ~..!E..3..|
00000030 eb 88 00 9d a1 d8 df 85 44 e6 92 dc 3c 17 24 02 |........D...<.$.|
00000040 c5 99 dd 8c 20 3e |.... >|
[587f 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5880 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 26 5f ec f9 cf 01 15 ee ae c9 |0E.!..&_........|
00000010 4f 15 41 f0 c1 cc 23 73 ba 6b 78 fa 08 ab e9 08 |O.A...#s.kx.....|
00000020 dc 2b fd 6b 9f 02 20 54 d3 89 a4 00 1f 36 d2 7f |.+.k.. T.....6..|
00000030 57 a5 5a c8 48 76 0f 8a 82 bb 45 be 4a e0 80 a4 |W.Z.Hv....E.J...|
00000040 14 ff 2f cf 3c e8 8a |../.<..|
[5881 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5882 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[5883 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72
[5884 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72
[5885 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[5886 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5887 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5888 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5889 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[588a 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[588b 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[588c 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[588d 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[588e 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[588f 01-03 17:56:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5890 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:17304203763311798096 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5891 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:17304203763311798096 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5892 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17304203763311798096 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5893 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5894 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5895 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5896 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5897 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5898 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5899 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[589a 01-03 17:56:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[589b 01-03 17:56:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6941765352749203598 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[589c 01-03 17:56:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:6941765352749203598 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[589d 01-03 17:56:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6941765352749203598 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[589e 01-03 17:56:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[589f 01-03 17:56:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58a0 01-03 17:56:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58a1 01-03 17:56:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58a2 01-03 17:56:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58a3 01-03 17:56:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58a4 01-03 17:56:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[58a5 01-03 17:56:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58a6 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[58a7 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[58a8 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58a9 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[58aa 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[58ab 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58ac 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[58ad 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[58ae 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[58af 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[58b0 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[58b1 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[58b2 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 7c e3 c4 d7 b5 62 7a 75 36 4e 9d 71 d9 eb 41 |^|....bzu6N.q..A|
00000010 6f 99 97 9a 36 d7 c4 ed 8f 99 1e b8 75 0a af 1f |o...6.......u...|
[58b3 01-03 17:56:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 ac 48 be a2 84 76 74 d6 8a b1 |0E.!...H...vt...|
00000010 50 db 0e 0d 64 a6 50 06 7c 5e 08 45 18 b0 df 09 |P...d.P.|^.E....|
00000020 ee 89 f4 ce e7 02 20 0b 56 80 27 85 03 02 0c b1 |...... .V.'.....|
00000030 45 dc ee 4b 14 9c 1b b7 07 51 cd 58 75 2f f5 7f |E..K.....Q.Xu/..|
00000040 ba 2a df 6a 1f f5 9b |.*.j...|
[58b4 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[58b5 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409420 gate 1578074205171076400 evaluation starts
[58b6 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409420 signed by 0 principal evaluation starts (used [false])
[58b7 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409420 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[58b8 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[58b9 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409420 principal evaluation fails
[58ba 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409420 gate 1578074205171076400 evaluation fails
[58bb 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[58bc 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[58bd 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[58be 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 7c e3 c4 d7 b5 62 7a 75 36 4e 9d 71 d9 eb 41 |^|....bzu6N.q..A|
00000010 6f 99 97 9a 36 d7 c4 ed 8f 99 1e b8 75 0a af 1f |o...6.......u...|
[58bf 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 ac 48 be a2 84 76 74 d6 8a b1 |0E.!...H...vt...|
00000010 50 db 0e 0d 64 a6 50 06 7c 5e 08 45 18 b0 df 09 |P...d.P.|^.E....|
00000020 ee 89 f4 ce e7 02 20 0b 56 80 27 85 03 02 0c b1 |...... .V.'.....|
00000030 45 dc ee 4b 14 9c 1b b7 07 51 cd 58 75 2f f5 7f |E..K.....Q.Xu/..|
00000040 ba 2a df 6a 1f f5 9b |.*.j...|
[58c0 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[58c1 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409d20 gate 1578074205172712900 evaluation starts
[58c2 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409d20 signed by 0 principal evaluation starts (used [false])
[58c3 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409d20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[58c4 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409d20 principal evaluation succeeds for identity 0
[58c5 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003409d20 gate 1578074205172712900 evaluation succeeds
[58c6 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[58c7 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[58c8 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[58c9 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[58ca 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[58cb 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes]}
[58cc 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72
[58cd 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72
[58ce 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[58cf 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58d0 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58d1 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58d2 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[58d3 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58d4 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58d5 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58d6 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[58d7 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[58d8 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[58d9 01-03 17:56:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58da 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[58db 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[58dc 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58dd 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[58de 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[58df 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58e0 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[58e1 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[58e2 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[58e3 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[58e4 01-03 17:56:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[58e5 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[58e6 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d ec 3b ef 74 fc c7 a9 45 83 4e f4 4f 2a 4b 2e |=.;.t...E.N.O*K.|
00000010 fb 89 42 99 d2 cc d0 69 aa b6 ed dc 48 50 28 4c |..B....i....HP(L|
[58e7 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 92 43 49 42 a9 ca 58 7f 76 98 32 |0D. ;.CIB..X.v.2|
00000010 e2 b6 44 fa 1d ec 52 f0 da 24 b0 48 11 ed 58 9d |..D...R..$.H..X.|
00000020 32 9d da aa 02 20 16 96 a0 ec 0b 92 dd db e2 5c |2.... .........\|
00000030 e9 d8 0f 6f b9 67 7b c9 cb ac 70 69 63 07 df 13 |...o.g{...pic...|
00000040 4a 4f 76 60 53 09 |JOv`S.|
[58e8 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[58e9 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445650 gate 1578074205200288600 evaluation starts
[58ea 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445650 signed by 0 principal evaluation starts (used [false])
[58eb 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445650 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[58ec 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[58ed 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445650 principal evaluation fails
[58ee 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445650 gate 1578074205200288600 evaluation fails
[58ef 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[58f0 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[58f1 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[58f2 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d ec 3b ef 74 fc c7 a9 45 83 4e f4 4f 2a 4b 2e |=.;.t...E.N.O*K.|
00000010 fb 89 42 99 d2 cc d0 69 aa b6 ed dc 48 50 28 4c |..B....i....HP(L|
[58f3 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 92 43 49 42 a9 ca 58 7f 76 98 32 |0D. ;.CIB..X.v.2|
00000010 e2 b6 44 fa 1d ec 52 f0 da 24 b0 48 11 ed 58 9d |..D...R..$.H..X.|
00000020 32 9d da aa 02 20 16 96 a0 ec 0b 92 dd db e2 5c |2.... .........\|
00000030 e9 d8 0f 6f b9 67 7b c9 cb ac 70 69 63 07 df 13 |...o.g{...pic...|
00000040 4a 4f 76 60 53 09 |JOv`S.|
[58f4 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[58f5 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445f50 gate 1578074205200839000 evaluation starts
[58f6 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445f50 signed by 0 principal evaluation starts (used [false])
[58f7 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445f50 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[58f8 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445f50 principal evaluation succeeds for identity 0
[58f9 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003445f50 gate 1578074205200839000 evaluation succeeds
[58fa 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[58fb 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[58fc 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[58fd 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[58fe 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[58ff 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes]}
[5900 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70
[5901 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70
[5902 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5903 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5904 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5905 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5906 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[5907 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5908 01-03 17:56:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5909 01-03 17:56:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[590a 01-03 17:56:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[590b 01-03 17:56:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[590c 01-03 17:56:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[590d 01-03 17:56:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[590e 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[590f 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16588036849804954147 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[5910 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[5911 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13773321220778389467 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[5912 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[5913 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2172777995593308821 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5914 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2172777995593308821 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5915 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5916 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16588036849804954147 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5917 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5918 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13773321220778389467 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5919 01-03 17:56:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[591a 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13773321220778389467 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[591b 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13773321220778389467 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[591c 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13773321220778389467 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[591d 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[591e 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16588036849804954147 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[591f 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16588036849804954147 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[5920 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5921 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2172777995593308821 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[5922 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2172777995593308821 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[5923 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2172777995593308821 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes
[5924 01-03 17:56:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5925 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151045
[5926 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1977F5959A0F6F42EF7B9DD53E0CF936ABACC5D93B089E58DE2CC67FFF8DA3F1
[5927 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5928 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5929 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[592a 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[592b 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[592c 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[592d 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[592e 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[592f 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5930 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5931 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5932 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5933 01-03 17:56:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5934 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[5935 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5936 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[5937 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5938 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 77 f5 95 9a 0f 6f 42 ef 7b 9d d5 3e 0c f9 36 |.w....oB.{..>..6|
00000010 ab ac c5 d9 3b 08 9e 58 de 2c c6 7f ff 8d a3 f1 |....;..X.,......|
[5939 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 09 8e 1e bc bd 92 80 6e 3f 9d |0E.!.........n?.|
00000010 4b 73 cd d6 cc 4d 45 87 e1 20 40 b2 e0 2b ad c8 |Ks...ME.. @..+..|
00000020 1b ee 98 9a 8a 02 20 5e 10 c6 ea a5 55 43 79 42 |...... ^....UCyB|
00000030 ab 0d 1b fa 95 21 de 4a 4a 4e 9e 57 dc 84 ea 7f |.....!.JJN.W....|
00000040 20 64 3a cf fc 4d 24 | d:..M$|
[593a 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[593b 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 3d a5 82 cf ce 58 36 e2 c8 49 09 |0D. Y=....X6..I.|
00000010 06 3e cb 36 3f 07 5c 4a 7a ab 9f a1 c3 14 46 06 |.>.6?.\Jz.....F.|
00000020 d7 58 8b 01 02 20 1d e0 38 64 3c 57 8f 15 71 19 |.X... ..8d<W..q.|
00000030 e5 74 9c 3a 48 c5 cc 32 dc 05 75 3b a1 69 90 14 |.t.:H..2..u;.i..|
00000040 79 19 2a 60 85 fd |y.*`..|
[593c 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[593d 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[593e 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[593f 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5940 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5941 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5942 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5943 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5944 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5945 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5946 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5947 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5948 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5949 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[594a 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[594b 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[594c 01-03 17:56:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 7c e3 c4 d7 b5 62 7a 75 36 4e 9d 71 d9 eb 41 |^|....bzu6N.q..A|
00000010 6f 99 97 9a 36 d7 c4 ed 8f 99 1e b8 75 0a af 1f |o...6.......u...|
[594d 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 ac 48 be a2 84 76 74 d6 8a b1 |0E.!...H...vt...|
00000010 50 db 0e 0d 64 a6 50 06 7c 5e 08 45 18 b0 df 09 |P...d.P.|^.E....|
00000020 ee 89 f4 ce e7 02 20 0b 56 80 27 85 03 02 0c b1 |...... .V.'.....|
00000030 45 dc ee 4b 14 9c 1b b7 07 51 cd 58 75 2f f5 7f |E..K.....Q.Xu/..|
00000040 ba 2a df 6a 1f f5 9b |.*.j...|
[594e 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[594f 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a14d0 gate 1578074205370455200 evaluation starts
[5950 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a14d0 signed by 0 principal evaluation starts (used [false])
[5951 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a14d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5952 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a14d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5953 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a14d0 principal evaluation fails
[5954 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a14d0 gate 1578074205370455200 evaluation fails
[5955 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5956 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5957 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5958 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 7c e3 c4 d7 b5 62 7a 75 36 4e 9d 71 d9 eb 41 |^|....bzu6N.q..A|
00000010 6f 99 97 9a 36 d7 c4 ed 8f 99 1e b8 75 0a af 1f |o...6.......u...|
[5959 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 ac 48 be a2 84 76 74 d6 8a b1 |0E.!...H...vt...|
00000010 50 db 0e 0d 64 a6 50 06 7c 5e 08 45 18 b0 df 09 |P...d.P.|^.E....|
00000020 ee 89 f4 ce e7 02 20 0b 56 80 27 85 03 02 0c b1 |...... .V.'.....|
00000030 45 dc ee 4b 14 9c 1b b7 07 51 cd 58 75 2f f5 7f |E..K.....Q.Xu/..|
00000040 ba 2a df 6a 1f f5 9b |.*.j...|
[595a 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[595b 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a1dd0 gate 1578074205372125800 evaluation starts
[595c 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a1dd0 signed by 0 principal evaluation starts (used [false])
[595d 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a1dd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[595e 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a1dd0 principal evaluation succeeds for identity 0
[595f 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a1dd0 gate 1578074205372125800 evaluation succeeds
[5960 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5961 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5962 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5963 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5964 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5965 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5966 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5967 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 49 ae 52 c1 a9 82 95 78 28 ac 06 6c 2f 3d 5a |%I.R....x(..l/=Z|
00000010 5a 43 36 d2 de c5 ec 1b 64 bf e9 78 bd 18 6d f4 |ZC6.....d..x..m.|
[5968 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c a1 cf 51 0e 20 2f ae 1c 6a 90 90 |0D. ,..Q. /..j..|
00000010 de 61 2e 3f 07 e7 0e ab 8f bd 9d e2 bc 35 07 e2 |.a.?.........5..|
00000020 10 6d b1 3a 02 20 7e a6 d4 21 45 c4 02 33 10 a6 |.m.:. ~..!E..3..|
00000030 eb 88 00 9d a1 d8 df 85 44 e6 92 dc 3c 17 24 02 |........D...<.$.|
00000040 c5 99 dd 8c 20 3e |.... >|
[5969 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[596a 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[596b 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[596c 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 77 f5 95 9a 0f 6f 42 ef 7b 9d d5 3e 0c f9 36 |.w....oB.{..>..6|
00000010 ab ac c5 d9 3b 08 9e 58 de 2c c6 7f ff 8d a3 f1 |....;..X.,......|
[596d 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 09 8e 1e bc bd 92 80 6e 3f 9d |0E.!.........n?.|
00000010 4b 73 cd d6 cc 4d 45 87 e1 20 40 b2 e0 2b ad c8 |Ks...ME.. @..+..|
00000020 1b ee 98 9a 8a 02 20 5e 10 c6 ea a5 55 43 79 42 |...... ^....UCyB|
00000030 ab 0d 1b fa 95 21 de 4a 4a 4e 9e 57 dc 84 ea 7f |.....!.JJN.W....|
00000040 20 64 3a cf fc 4d 24 | d:..M$|
[596e 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[596f 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5970 01-03 17:56:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5971 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5972 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5973 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5974 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5975 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5976 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5977 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5978 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5979 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[597a 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[597b 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[597c 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[597d 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[597e 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d ec 3b ef 74 fc c7 a9 45 83 4e f4 4f 2a 4b 2e |=.;.t...E.N.O*K.|
00000010 fb 89 42 99 d2 cc d0 69 aa b6 ed dc 48 50 28 4c |..B....i....HP(L|
[597f 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 92 43 49 42 a9 ca 58 7f 76 98 32 |0D. ;.CIB..X.v.2|
00000010 e2 b6 44 fa 1d ec 52 f0 da 24 b0 48 11 ed 58 9d |..D...R..$.H..X.|
00000020 32 9d da aa 02 20 16 96 a0 ec 0b 92 dd db e2 5c |2.... .........\|
00000030 e9 d8 0f 6f b9 67 7b c9 cb ac 70 69 63 07 df 13 |...o.g{...pic...|
00000040 4a 4f 76 60 53 09 |JOv`S.|
[5980 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5981 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348fa40 gate 1578074205386183600 evaluation starts
[5982 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348fa40 signed by 0 principal evaluation starts (used [false])
[5983 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348fa40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5984 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348fa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5985 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348fa40 principal evaluation fails
[5986 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348fa40 gate 1578074205386183600 evaluation fails
[5987 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5988 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5989 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[598a 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d ec 3b ef 74 fc c7 a9 45 83 4e f4 4f 2a 4b 2e |=.;.t...E.N.O*K.|
00000010 fb 89 42 99 d2 cc d0 69 aa b6 ed dc 48 50 28 4c |..B....i....HP(L|
[598b 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 92 43 49 42 a9 ca 58 7f 76 98 32 |0D. ;.CIB..X.v.2|
00000010 e2 b6 44 fa 1d ec 52 f0 da 24 b0 48 11 ed 58 9d |..D...R..$.H..X.|
00000020 32 9d da aa 02 20 16 96 a0 ec 0b 92 dd db e2 5c |2.... .........\|
00000030 e9 d8 0f 6f b9 67 7b c9 cb ac 70 69 63 07 df 13 |...o.g{...pic...|
00000040 4a 4f 76 60 53 09 |JOv`S.|
[598c 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[598d 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e0340 gate 1578074205387860100 evaluation starts
[598e 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e0340 signed by 0 principal evaluation starts (used [false])
[598f 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e0340 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5990 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e0340 principal evaluation succeeds for identity 0
[5991 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e0340 gate 1578074205387860100 evaluation succeeds
[5992 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5993 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5994 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5995 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5996 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5997 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5998 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5999 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 77 f5 95 9a 0f 6f 42 ef 7b 9d d5 3e 0c f9 36 |.w....oB.{..>..6|
00000010 ab ac c5 d9 3b 08 9e 58 de 2c c6 7f ff 8d a3 f1 |....;..X.,......|
[599a 01-03 17:56:45.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 09 8e 1e bc bd 92 80 6e 3f 9d |0E.!.........n?.|
00000010 4b 73 cd d6 cc 4d 45 87 e1 20 40 b2 e0 2b ad c8 |Ks...ME.. @..+..|
00000020 1b ee 98 9a 8a 02 20 5e 10 c6 ea a5 55 43 79 42 |...... ^....UCyB|
00000030 ab 0d 1b fa 95 21 de 4a 4a 4e 9e 57 dc 84 ea 7f |.....!.JJN.W....|
00000040 20 64 3a cf fc 4d 24 | d:..M$|
[599b 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[599c 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[599d 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[599e 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[599f 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 49 ae 52 c1 a9 82 95 78 28 ac 06 6c 2f 3d 5a |%I.R....x(..l/=Z|
00000010 5a 43 36 d2 de c5 ec 1b 64 bf e9 78 bd 18 6d f4 |ZC6.....d..x..m.|
[59a0 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c a1 cf 51 0e 20 2f ae 1c 6a 90 90 |0D. ,..Q. /..j..|
00000010 de 61 2e 3f 07 e7 0e ab 8f bd 9d e2 bc 35 07 e2 |.a.?.........5..|
00000020 10 6d b1 3a 02 20 7e a6 d4 21 45 c4 02 33 10 a6 |.m.:. ~..!E..3..|
00000030 eb 88 00 9d a1 d8 df 85 44 e6 92 dc 3c 17 24 02 |........D...<.$.|
00000040 c5 99 dd 8c 20 3e |.... >|
[59a1 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[59a2 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[59a3 01-03 17:56:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[59a4 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59a5 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59a6 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[59a7 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[59a8 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[59a9 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[59aa 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[59ab 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[59ac 01-03 17:56:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[59ad 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[59ae 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[59af 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[59b0 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[59b1 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[59b2 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59b3 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59b4 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[59b5 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[59b6 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[59b7 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[59b8 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[59b9 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[59ba 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[59bb 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[59bc 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59bd 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035266d0 gate 1578074205418110100 evaluation starts
[59be 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035266d0 signed by 0 principal evaluation starts (used [false])
[59bf 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035266d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[59c0 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035266d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[59c1 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035266d0 principal evaluation fails
[59c2 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035266d0 gate 1578074205418110100 evaluation fails
[59c3 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[59c4 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[59c5 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[59c6 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[59c7 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[59c8 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59c9 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003526fd0 gate 1578074205419792900 evaluation starts
[59ca 01-03 17:56:45.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003526fd0 signed by 0 principal evaluation starts (used [false])
[59cb 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003526fd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[59cc 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003526fd0 principal evaluation succeeds for identity 0
[59cd 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003526fd0 gate 1578074205419792900 evaluation succeeds
[59ce 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[59cf 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[59d0 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[59d1 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[59d2 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59d3 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59d4 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[59d5 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[59d6 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[59d7 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[59d8 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[59d9 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[59da 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[59db 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[59dc 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59dd 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a30 gate 1578074205422467900 evaluation starts
[59de 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a30 signed by 0 principal evaluation starts (used [false])
[59df 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[59e0 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[59e1 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a30 principal evaluation fails
[59e2 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a30 gate 1578074205422467900 evaluation fails
[59e3 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[59e4 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[59e5 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[59e6 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[59e7 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[59e8 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59e9 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547330 gate 1578074205422873500 evaluation starts
[59ea 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547330 signed by 0 principal evaluation starts (used [false])
[59eb 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547330 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[59ec 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547330 principal evaluation succeeds for identity 0
[59ed 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547330 gate 1578074205422873500 evaluation succeeds
[59ee 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[59ef 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[59f0 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[59f1 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[59f2 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[59f3 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[59f4 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[59f5 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59f6 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59f7 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59f8 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[59f9 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[59fa 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[59fb 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[59fc 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[59fd 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[59fe 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[59ff 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5a00 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a01 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567170 gate 1578074205427032900 evaluation starts
[5a02 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567170 signed by 0 principal evaluation starts (used [false])
[5a03 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567170 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5a04 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5a05 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567170 principal evaluation fails
[5a06 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567170 gate 1578074205427032900 evaluation fails
[5a07 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5a08 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5a09 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5a0a 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5a0b 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5a0c 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a0d 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567a70 gate 1578074205428576900 evaluation starts
[5a0e 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567a70 signed by 0 principal evaluation starts (used [false])
[5a0f 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567a70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5a10 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567a70 principal evaluation succeeds for identity 0
[5a11 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567a70 gate 1578074205428576900 evaluation succeeds
[5a12 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5a13 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5a14 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5a15 01-03 17:56:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5a16 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[5a17 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[5a18 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a19 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a1a 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5a1b 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5a1c 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5a1d 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5a1e 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5a1f 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5a20 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5a21 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5a22 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a23 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357fb80 gate 1578074205433180300 evaluation starts
[5a24 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357fb80 signed by 0 principal evaluation starts (used [false])
[5a25 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357fb80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5a26 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357fb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5a27 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357fb80 principal evaluation fails
[5a28 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357fb80 gate 1578074205433180300 evaluation fails
[5a29 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5a2a 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5a2b 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5a2c 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5a2d 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5a2e 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a2f 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b6480 gate 1578074205433592200 evaluation starts
[5a30 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b6480 signed by 0 principal evaluation starts (used [false])
[5a31 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b6480 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5a32 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b6480 principal evaluation succeeds for identity 0
[5a33 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info
[5a34 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]
[5a35 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile
[5a36 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5a37 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b6480 gate 1578074205433592200 evaluation succeeds
[5a38 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5a39 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5a3a 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5a3b 01-03 17:56:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5a3c 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[5a3d 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5a3e 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a3f 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5a40 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a41 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a42 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a43 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5a44 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5a45 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5a46 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5a47 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5a48 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5a49 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5a4a 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5a4b 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a4c 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8840 gate 1578074205443874300 evaluation starts
[5a4d 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8840 signed by 0 principal evaluation starts (used [false])
[5a4e 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8840 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5a4f 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5a50 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8840 principal evaluation fails
[5a51 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8840 gate 1578074205443874300 evaluation fails
[5a52 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5a53 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5a54 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5a55 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5a56 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5a57 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a58 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d9140 gate 1578074205445490300 evaluation starts
[5a59 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d9140 signed by 0 principal evaluation starts (used [false])
[5a5a 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d9140 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5a5b 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d9140 principal evaluation succeeds for identity 0
[5a5c 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d9140 gate 1578074205445490300 evaluation succeeds
[5a5d 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5a5e 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5a5f 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5a60 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5a61 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[5a62 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[5a63 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[5a64 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5a65 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a66 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a67 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5a68 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5a69 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5a6a 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5a6b 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5a6c 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5a6d 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5a6e 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5a6f 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a70 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601900 gate 1578074205448562200 evaluation starts
[5a71 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601900 signed by 0 principal evaluation starts (used [false])
[5a72 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601900 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5a73 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5a74 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601900 principal evaluation fails
[5a75 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601900 gate 1578074205448562200 evaluation fails
[5a76 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5a77 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5a78 01-03 17:56:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5a79 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5a7a 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5a7b 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a7c 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003628200 gate 1578074205454765300 evaluation starts
[5a7d 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003628200 signed by 0 principal evaluation starts (used [false])
[5a7e 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003628200 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5a7f 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003628200 principal evaluation succeeds for identity 0
[5a80 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003628200 gate 1578074205454765300 evaluation succeeds
[5a81 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5a82 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5a83 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5a84 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5a85 01-03 17:56:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a86 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a87 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a88 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[5a89 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a8a 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a8b 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8137751955695934245 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[5a8c 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8137751955695934245 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5a8d 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a8e 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8137751955695934245 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[5a8f 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8137751955695934245 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[5a90 01-03 17:56:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a91 01-03 17:56:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[5a92 01-03 17:56:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a93 01-03 17:56:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a94 01-03 17:56:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a95 01-03 17:56:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:936561975930843118 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5a96 01-03 17:56:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:936561975930843118 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5a97 01-03 17:56:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5a98 01-03 17:56:45.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a99 01-03 17:56:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[5a9a 01-03 17:56:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[5a9b 01-03 17:56:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a9c 01-03 17:56:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a9d 01-03 17:56:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a9e 01-03 17:56:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a9f 01-03 17:56:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[5aa0 01-03 17:56:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[5aa1 01-03 17:56:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aa2 01-03 17:56:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aa3 01-03 17:56:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aa4 01-03 17:56:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aa5 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[5aa6 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[5aa7 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510191801
[5aa8 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F78A839E3A388A10F09BADA9332BF3A34F3DDADC6BF394FEFDE80577A441DDAA
[5aa9 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[5aaa 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aab 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aac 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aad 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aae 01-03 17:56:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:25 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[5aaf 01-03 17:56:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ab0 01-03 17:56:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ab1 01-03 17:56:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:25 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[5ab2 01-03 17:56:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ab3 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5ab4 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ab5 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5ab6 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5ab7 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 de 09 5e 47 ec 3c ba f6 39 fe 06 fd 02 4c 97 |...^G.<..9....L.|
00000010 68 74 72 3a 9e 96 56 de a2 98 1f 37 5c 51 cc a5 |htr:..V....7\Q..|
[5ab8 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 1b 0e fa b5 ff 84 58 5b a2 cb |0E.!........X[..|
00000010 d9 da 62 5a 78 e5 cf c9 60 ee 4f c4 20 8a 00 58 |..bZx...`.O. ..X|
00000020 6b 1e 35 ee 13 02 20 66 17 bc ab 7a ea 44 01 20 |k.5... f...z.D. |
00000030 fb c8 bc 87 84 4a 57 32 95 bb d4 3f d4 ce c2 b9 |.....JW2...?....|
00000040 bf 60 56 11 26 74 5c |.`V.&t\|
[5ab9 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5aba 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be ea 9e 18 9f b1 15 8c 4b b8 50 |0E.!.........K.P|
00000010 7c 46 6c 09 7b 80 b3 f7 d3 8a d5 37 43 d9 e5 d4 ||Fl.{......7C...|
00000020 c4 cd 27 bc 55 02 20 4e 8e 33 85 46 32 0d 5f de |..'.U. N.3.F2._.|
00000030 f4 35 69 4c 6e 52 0b d4 4c ae e0 76 3d 15 ad 27 |.5iLnR..L..v=..'|
00000040 2e b2 38 ea e4 3f df |..8..?.|
[5abb 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5abc 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[5abd 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73
[5abe 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73
[5abf 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[5ac0 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ac1 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ac2 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ac3 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5ac4 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5ac5 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ac6 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5ac7 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ac8 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ac9 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aca 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5acb 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5acc 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5acd 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5ace 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5acf 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ad0 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5ad1 01-03 17:56:46.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ad2 01-03 17:56:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5ad3 01-03 17:56:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5ad4 01-03 17:56:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ad5 01-03 17:56:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5ad6 01-03 17:56:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ad7 01-03 17:56:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:17584846359347493896 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5ad8 01-03 17:56:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17584846359347493896 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5ad9 01-03 17:56:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5ada 01-03 17:56:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5adb 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[5adc 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5add 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[5ade 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5adf 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 25 31 14 0b 21 93 77 f9 57 70 bd f4 5e 5e 86 |.%1..!.w.Wp..^^.|
00000010 1e 19 d2 72 91 b7 3c 4a aa 3e 82 87 76 9f fe d2 |...r..<J.>..v...|
[5ae0 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 2d dc 04 61 67 9d fe 27 b5 07 72 |0D. @-..ag..'..r|
00000010 1b 37 33 2f 59 ef 19 94 45 9b 90 40 7a 4e ee a5 |.73/Y...E..@zN..|
00000020 8d 0c da 78 02 20 5e ff d7 3b 93 46 e8 03 bc 29 |...x. ^..;.F...)|
00000030 b3 54 2d a6 b3 bd 97 2b 10 3c 39 f3 fd 73 a3 ce |.T-....+.<9..s..|
00000040 27 e5 58 7c 72 b2 |'.X|r.|
[5ae1 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5ae2 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 0b 18 f5 39 fd 10 c5 69 eb 27 ca |0D. e...9...i.'.|
00000010 c5 e8 b5 eb c9 55 b3 8b ba 0a 0a 7b 00 5a b2 bd |.....U.....{.Z..|
00000020 d7 bf d2 7a 02 20 01 7f a5 7a 02 dd be 39 81 2e |...z. ...z...9..|
00000030 ef b5 e3 95 d2 d4 76 9f 86 23 68 d5 af ce 36 36 |......v..#h...66|
00000040 47 4b c8 18 d5 85 |GK....|
[5ae3 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5ae4 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[5ae5 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74
[5ae6 01-03 17:56:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74
[5ae7 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[5ae8 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ae9 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aea 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aeb 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5aec 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aed 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aee 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers
[5aef 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[5af0 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[5af1 01-03 17:56:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5af2 01-03 17:56:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5af3 01-03 17:56:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5af4 01-03 17:56:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5af5 01-03 17:56:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5af6 01-03 17:56:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5af7 01-03 17:56:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5af8 01-03 17:56:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5af9 01-03 17:56:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5afa 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5afb 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5afc 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5afd 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5afe 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 6f 75 67 7e 27 2e 79 d1 10 4e f1 08 7c ab 8a |.oug~'.y..N..|..|
00000010 74 b2 67 e2 2c 06 3b 99 40 3a a5 5b dc ca 1c 01 |t.g.,.;.@:.[....|
[5aff 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 0d 34 52 fa 9e 65 d1 b3 a0 df 80 |0D. r.4R..e.....|
00000010 4c 06 f0 25 03 66 b3 a2 ad 46 6a f0 e8 77 2a 84 |L..%.f...Fj..w*.|
00000020 e8 f4 42 27 02 20 1f 5b 75 e8 0c f7 ec 29 39 78 |..B'. .[u....)9x|
00000030 1a 94 ac 8d 6a e3 69 d3 a8 e4 da 05 96 36 2a a6 |....j.i......6*.|
00000040 b9 dd 80 30 f6 fb |...0..|
[5b00 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5b01 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003724940 gate 1578074208000556500 evaluation starts
[5b02 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003724940 signed by 0 principal evaluation starts (used [false])
[5b03 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003724940 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5b04 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003724940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5b05 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003724940 principal evaluation fails
[5b06 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003724940 gate 1578074208000556500 evaluation fails
[5b07 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5b08 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5b09 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5b0a 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 6f 75 67 7e 27 2e 79 d1 10 4e f1 08 7c ab 8a |.oug~'.y..N..|..|
00000010 74 b2 67 e2 2c 06 3b 99 40 3a a5 5b dc ca 1c 01 |t.g.,.;.@:.[....|
[5b0b 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 0d 34 52 fa 9e 65 d1 b3 a0 df 80 |0D. r.4R..e.....|
00000010 4c 06 f0 25 03 66 b3 a2 ad 46 6a f0 e8 77 2a 84 |L..%.f...Fj..w*.|
00000020 e8 f4 42 27 02 20 1f 5b 75 e8 0c f7 ec 29 39 78 |..B'. .[u....)9x|
00000030 1a 94 ac 8d 6a e3 69 d3 a8 e4 da 05 96 36 2a a6 |....j.i......6*.|
00000040 b9 dd 80 30 f6 fb |...0..|
[5b0c 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5b0d 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003725240 gate 1578074208001411200 evaluation starts
[5b0e 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003725240 signed by 0 principal evaluation starts (used [false])
[5b0f 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003725240 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5b10 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003725240 principal evaluation succeeds for identity 0
[5b11 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003725240 gate 1578074208001411200 evaluation succeeds
[5b12 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5b13 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5b14 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5b15 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5b16 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5b17 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes]}
[5b18 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71
[5b19 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71
[5b1a 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5b1b 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b1c 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b1d 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b1e 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b1f 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b20 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b21 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b22 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b23 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b24 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5b25 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b26 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b27 01-03 17:56:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5b28 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5b29 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b2a 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5b2b 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b2c 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5b2d 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5b2e 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b2f 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5b30 01-03 17:56:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b31 01-03 17:56:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5b32 01-03 17:56:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b33 01-03 17:56:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5b34 01-03 17:56:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b35 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b36 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b37 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b38 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b39 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5b3a 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b3b 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5b3c 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5b3d 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5b3e 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5b3f 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5b40 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5b41 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 3b d0 91 b9 c1 f2 14 61 5c 1a 72 1a 7d 21 43 |R;......a\.r.}!C|
00000010 e4 19 bf dd 60 02 f7 6c fb fb 09 d8 ef 02 ff c2 |....`..l........|
[5b42 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 5f 6d 8e b7 c6 2b 7b cd 78 95 |0E.!.._m...+{.x.|
00000010 34 d1 3a b4 b1 de a1 0a 2f cf a7 e2 c7 ec 09 11 |4.:...../.......|
00000020 18 4f 65 39 7c 02 20 4a b2 69 78 d2 c6 ae 78 aa |.Oe9|. J.ix...x.|
00000030 85 11 6d a9 a0 53 05 5c 72 c0 99 27 18 45 64 68 |..m..S.\r..'.Edh|
00000040 41 b3 a0 43 d6 69 fe |A..C.i.|
[5b43 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5b44 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6fb0 gate 1578074208073801400 evaluation starts
[5b45 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6fb0 signed by 0 principal evaluation starts (used [false])
[5b46 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6fb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5b47 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5b48 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6fb0 principal evaluation fails
[5b49 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6fb0 gate 1578074208073801400 evaluation fails
[5b4a 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5b4b 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5b4c 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5b4d 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 3b d0 91 b9 c1 f2 14 61 5c 1a 72 1a 7d 21 43 |R;......a\.r.}!C|
00000010 e4 19 bf dd 60 02 f7 6c fb fb 09 d8 ef 02 ff c2 |....`..l........|
[5b4e 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 5f 6d 8e b7 c6 2b 7b cd 78 95 |0E.!.._m...+{.x.|
00000010 34 d1 3a b4 b1 de a1 0a 2f cf a7 e2 c7 ec 09 11 |4.:...../.......|
00000020 18 4f 65 39 7c 02 20 4a b2 69 78 d2 c6 ae 78 aa |.Oe9|. J.ix...x.|
00000030 85 11 6d a9 a0 53 05 5c 72 c0 99 27 18 45 64 68 |..m..S.\r..'.Edh|
00000040 41 b3 a0 43 d6 69 fe |A..C.i.|
[5b4f 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5b50 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b78b0 gate 1578074208075695700 evaluation starts
[5b51 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b78b0 signed by 0 principal evaluation starts (used [false])
[5b52 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b78b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5b53 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b78b0 principal evaluation succeeds for identity 0
[5b54 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b78b0 gate 1578074208075695700 evaluation succeeds
[5b55 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5b56 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5b57 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5b58 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5b59 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b5a 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes]}
[5b5b 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73
[5b5c 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73
[5b5d 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5b5e 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b5f 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b60 01-03 17:56:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b61 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b62 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b63 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b64 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b65 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b66 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b67 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b68 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5b69 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b6a 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5b6b 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b6c 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b6d 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b6e 01-03 17:56:48.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b6f 01-03 17:56:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b70 01-03 17:56:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b71 01-03 17:56:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b72 01-03 17:56:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b73 01-03 17:56:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b74 01-03 17:56:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b75 01-03 17:56:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b76 01-03 17:56:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5b77 01-03 17:56:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b78 01-03 17:56:48.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151046
[5b79 01-03 17:56:48.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DF5C1E2F8E7550C0D05FEA5057546C9E707FCE7A0E8EC79F6A7C050483FBCEA8
[5b7a 01-03 17:56:48.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5b7b 01-03 17:56:48.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5b7c 01-03 17:56:48.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[5b7d 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b7e 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b7f 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[5b80 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b81 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5b82 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5b83 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b84 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b85 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5b86 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5b87 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5b88 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b89 01-03 17:56:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b8a 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57524
[5b8b 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU 329d955a1c7e6586b85b5cedbebdab235d1e2f052764a96929aa2af4da95b8b8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[5b8c 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU 329d955a1c7e6586b85b5cedbebdab235d1e2f052764a96929aa2af4da95b8b8 creator is valid
[5b8d 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 d2 03 16 0e b4 b0 a1 17 92 96 df fc 21 78 a8 |t............!x.|
00000010 c4 05 85 ad 2f 81 18 46 2b 90 0f 83 a1 5c da d6 |..../..F+....\..|
[5b8e 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 6a 28 db 40 ce fe 93 e0 f7 19 cd |0D. Dj(.@.......|
00000010 96 61 4e 3d 87 9b 80 97 28 0e 4a 3e 0f 0d 2b 09 |.aN=....(.J>..+.|
00000020 6b d8 4b 40 02 20 7b 79 2f fc 37 f1 3e a4 44 47 |k.K@. {y/.7.>.DG|
00000030 0e c3 91 93 8b d3 59 1a 53 6c 8b 26 29 69 43 e5 |......Y.Sl.&)iC.|
00000040 e9 5e 69 10 9e 00 |.^i...|
[5b8f 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU 329d955a1c7e6586b85b5cedbebdab235d1e2f052764a96929aa2af4da95b8b8 signature is valid
[5b90 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU [][329d955a] processing txid: 329d955a1c7e6586b85b5cedbebdab235d1e2f052764a96929aa2af4da95b8b8
[5b91 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU [][329d955a] Entry chaincode: _lifecycle
[5b92 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> INFO [][329d955a] Entry chaincode: _lifecycle
[5b93 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU [329d955a] getting chaincode data for _lifecycle on channel
[5b94 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[5b95 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 d2 03 16 0e b4 b0 a1 17 92 96 df fc 21 78 a8 |t............!x.|
00000010 c4 05 85 ad 2f 81 18 46 2b 90 0f 83 a1 5c da d6 |..../..F+....\..|
[5b96 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 6a 28 db 40 ce fe 93 e0 f7 19 cd |0D. Dj(.@.......|
00000010 96 61 4e 3d 87 9b 80 97 28 0e 4a 3e 0f 0d 2b 09 |.aN=....(.J>..+.|
00000020 6b d8 4b 40 02 20 7b 79 2f fc 37 f1 3e a4 44 47 |k.K@. {y/.7.>.DG|
00000030 0e c3 91 93 8b d3 59 1a 53 6c 8b 26 29 69 43 e5 |......Y.Sl.&)iC.|
00000040 e9 5e 69 10 9e 00 |.^i...|
[5b97 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of QueryInstalledChaincodes
[5b98 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU [329d955a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[5b99 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU [329d955a] notifying Txid:329d955a1c7e6586b85b5cedbebdab235d1e2f052764a96929aa2af4da95b8b8, channelID:
[5b9a 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[5b9b 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> INFO [][329d955a] Exit chaincode: _lifecycle (3ms)
[5b9c 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU [][329d955a] Exit
[5b9d 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57524
[5b9e 01-03 17:56:48.52 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57524 grpc.code=OK grpc.call_duration=6.3661ms
[5b9f 01-03 17:56:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[5ba0 01-03 17:56:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[5ba1 01-03 17:56:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:550567495574983675 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5ba2 01-03 17:56:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:550567495574983675 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5ba3 01-03 17:56:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:550567495574983675 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5ba4 01-03 17:56:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ba5 01-03 17:56:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ba6 01-03 17:56:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ba7 01-03 17:56:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ba8 01-03 17:56:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ba9 01-03 17:56:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5baa 01-03 17:56:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[5bab 01-03 17:56:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bac 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:4756868622117153333 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5bad 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:4756868622117153333 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5bae 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4756868622117153333 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5baf 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bb0 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bb1 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bb2 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bb3 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bb4 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bb5 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[5bb6 01-03 17:56:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bb7 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57532
[5bb8 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU e92676171b2834e29ec3232b7c5df60814f388e29958559c108b09730560756c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[5bb9 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU e92676171b2834e29ec3232b7c5df60814f388e29958559c108b09730560756c creator is valid
[5bba 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 35 09 b9 17 ee fc e7 f3 ce bd 8d 86 86 00 6c |.5.............l|
00000010 f1 cb ec 20 52 52 4b 32 ed 93 88 25 70 12 aa cc |... RRK2...%p...|
[5bbb 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 1d 0e 71 45 71 21 2d 82 5d f0 |0E.!....qEq!-.].|
00000010 e2 13 9a 5a 32 22 14 6d 4d 79 a4 8f eb a6 68 ee |...Z2".mMy....h.|
00000020 f7 3d b6 a3 2b 02 20 00 cf 3c 1e 18 67 2e 27 ab |.=..+. ..<..g.'.|
00000030 c4 85 80 ce 67 c6 80 15 f9 65 d4 1d 9e 24 0a 8d |....g....e...$..|
00000040 c3 3e ad fe 9b 85 b5 |.>.....|
[5bbc 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU e92676171b2834e29ec3232b7c5df60814f388e29958559c108b09730560756c signature is valid
[5bbd 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU [][e9267617] processing txid: e92676171b2834e29ec3232b7c5df60814f388e29958559c108b09730560756c
[5bbe 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU [][e9267617] Entry chaincode: _lifecycle
[5bbf 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> INFO [][e9267617] Entry chaincode: _lifecycle
[5bc0 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU [e9267617] getting chaincode data for _lifecycle on channel
[5bc1 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[5bc2 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 35 09 b9 17 ee fc e7 f3 ce bd 8d 86 86 00 6c |.5.............l|
00000010 f1 cb ec 20 52 52 4b 32 ed 93 88 25 70 12 aa cc |... RRK2...%p...|
[5bc3 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 1d 0e 71 45 71 21 2d 82 5d f0 |0E.!....qEq!-.].|
00000010 e2 13 9a 5a 32 22 14 6d 4d 79 a4 8f eb a6 68 ee |...Z2".mMy....h.|
00000020 f7 3d b6 a3 2b 02 20 00 cf 3c 1e 18 67 2e 27 ab |.=..+. ..<..g.'.|
00000030 c4 85 80 ce 67 c6 80 15 f9 65 d4 1d 9e 24 0a 8d |....g....e...$..|
00000040 c3 3e ad fe 9b 85 b5 |.>.....|
[5bc4 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of QueryInstalledChaincodes
[5bc5 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU [e9267617] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[5bc6 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU [e9267617] notifying Txid:e92676171b2834e29ec3232b7c5df60814f388e29958559c108b09730560756c, channelID:
[5bc7 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[5bc8 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> INFO [][e9267617] Exit chaincode: _lifecycle (1ms)
[5bc9 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU [][e9267617] Exit
[5bca 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57532
[5bcb 01-03 17:56:49.08 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57532 grpc.code=OK grpc.call_duration=2.4529ms
[5bcc 01-03 17:56:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[5bcd 01-03 17:56:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[5bce 01-03 17:56:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5bcf 01-03 17:56:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5bd0 01-03 17:56:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bd1 01-03 17:56:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5bd2 01-03 17:56:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5bd3 01-03 17:56:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bd4 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5bd5 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5bd6 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5bd7 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5bd8 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5bd9 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5bda 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a ab 8f 89 6c cb 0a 7d 4b da bb 52 95 2d 01 8b |z...l..}K..R.-..|
00000010 49 d6 ab eb a0 81 ab db 9a e4 0e 9e 9f 96 c9 3a |I..............:|
[5bdb 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 64 f5 12 27 55 16 c7 94 1e b2 25 |0D. dd..'U.....%|
00000010 8a 3f 04 aa e5 b8 c7 56 ec e0 ad 9b 3f 75 6c 7a |.?.....V....?ulz|
00000020 2e 6d 2c 90 02 20 38 88 18 d5 5b c6 85 d3 71 53 |.m,.. 8...[...qS|
00000030 53 2f 7c 87 05 d6 b8 e7 ad 7e 03 f9 3f 55 07 ba |S/|......~..?U..|
00000040 b4 1f be f7 e9 51 |.....Q|
[5bdc 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5bdd 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039257c0 gate 1578074209140333300 evaluation starts
[5bde 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039257c0 signed by 0 principal evaluation starts (used [false])
[5bdf 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039257c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5be0 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039257c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5be1 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039257c0 principal evaluation fails
[5be2 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039257c0 gate 1578074209140333300 evaluation fails
[5be3 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5be4 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5be5 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5be6 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a ab 8f 89 6c cb 0a 7d 4b da bb 52 95 2d 01 8b |z...l..}K..R.-..|
00000010 49 d6 ab eb a0 81 ab db 9a e4 0e 9e 9f 96 c9 3a |I..............:|
[5be7 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 64 f5 12 27 55 16 c7 94 1e b2 25 |0D. dd..'U.....%|
00000010 8a 3f 04 aa e5 b8 c7 56 ec e0 ad 9b 3f 75 6c 7a |.?.....V....?ulz|
00000020 2e 6d 2c 90 02 20 38 88 18 d5 5b c6 85 d3 71 53 |.m,.. 8...[...qS|
00000030 53 2f 7c 87 05 d6 b8 e7 ad 7e 03 f9 3f 55 07 ba |S/|......~..?U..|
00000040 b4 1f be f7 e9 51 |.....Q|
[5be8 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5be9 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039400c0 gate 1578074209140761300 evaluation starts
[5bea 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039400c0 signed by 0 principal evaluation starts (used [false])
[5beb 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039400c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5bec 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039400c0 principal evaluation succeeds for identity 0
[5bed 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039400c0 gate 1578074209140761300 evaluation succeeds
[5bee 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5bef 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5bf0 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5bf1 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5bf2 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[5bf3 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes]}
[5bf4 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74
[5bf5 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74
[5bf6 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5bf7 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bf8 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bf9 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bfa 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[5bfb 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bfc 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bfd 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bfe 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[5bff 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5c00 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[5c01 01-03 17:56:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c02 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5c03 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5c04 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c05 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5c06 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5c07 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c08 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5c09 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5c0a 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5c0b 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5c0c 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5c0d 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5c0e 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 ec 7f ce f9 a2 24 d3 03 99 7c 31 23 1c ac b2 |s.....$...|1#...|
00000010 d1 b1 a5 aa 23 bc 52 d4 84 23 2a 7d ae 55 61 2d |....#.R..#*}.Ua-|
[5c0f 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 4d 34 29 5c bc 43 8f 9f cc 32 |0E.!..M4)\.C...2|
00000010 52 3b e7 44 73 a0 54 1b 4a aa 63 01 16 20 45 72 |R;.Ds.T.J.c.. Er|
00000020 20 29 50 a1 5b 02 20 79 72 44 e3 62 bb a2 54 3c | )P.[. yrD.b..T<|
00000030 3e bd 65 3d ec 59 01 1b 70 75 2a 40 b0 86 8d cd |>.e=.Y..pu*@....|
00000040 00 ed c8 71 61 be 42 |...qa.B|
[5c10 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c11 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974fe0 gate 1578074209179910000 evaluation starts
[5c12 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974fe0 signed by 0 principal evaluation starts (used [false])
[5c13 01-03 17:56:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974fe0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5c14 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5c15 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974fe0 principal evaluation fails
[5c16 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003974fe0 gate 1578074209179910000 evaluation fails
[5c17 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5c18 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5c19 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5c1a 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 ec 7f ce f9 a2 24 d3 03 99 7c 31 23 1c ac b2 |s.....$...|1#...|
00000010 d1 b1 a5 aa 23 bc 52 d4 84 23 2a 7d ae 55 61 2d |....#.R..#*}.Ua-|
[5c1b 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 4d 34 29 5c bc 43 8f 9f cc 32 |0E.!..M4)\.C...2|
00000010 52 3b e7 44 73 a0 54 1b 4a aa 63 01 16 20 45 72 |R;.Ds.T.J.c.. Er|
00000020 20 29 50 a1 5b 02 20 79 72 44 e3 62 bb a2 54 3c | )P.[. yrD.b..T<|
00000030 3e bd 65 3d ec 59 01 1b 70 75 2a 40 b0 86 8d cd |>.e=.Y..pu*@....|
00000040 00 ed c8 71 61 be 42 |...qa.B|
[5c1c 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c1d 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039758e0 gate 1578074209180432100 evaluation starts
[5c1e 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039758e0 signed by 0 principal evaluation starts (used [false])
[5c1f 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039758e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5c20 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039758e0 principal evaluation succeeds for identity 0
[5c21 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039758e0 gate 1578074209180432100 evaluation succeeds
[5c22 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5c23 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5c24 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5c25 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5c26 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5c27 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes]}
[5c28 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72
[5c29 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72
[5c2a 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5c2b 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c2c 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c2d 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c2e 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[5c2f 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c30 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c31 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c32 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[5c33 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5c34 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5c35 01-03 17:56:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c36 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[5c37 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7070599898954071425 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5c38 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[5c39 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1347273941733063049 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5c3a 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[5c3b 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1410025659995404694 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5c3c 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1410025659995404694 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5c3d 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c3e 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7070599898954071425 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5c3f 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c40 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1347273941733063049 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5c41 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c42 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1347273941733063049 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[5c43 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1347273941733063049 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[5c44 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1347273941733063049 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[5c45 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7070599898954071425 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[5c46 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c47 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1410025659995404694 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[5c48 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1410025659995404694 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[5c49 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c4a 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7070599898954071425 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[5c4b 01-03 17:56:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7070599898954071425 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[5c4c 01-03 17:56:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c4d 01-03 17:56:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57536
[5c4e 01-03 17:56:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c4f 01-03 17:56:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[5c50 01-03 17:56:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[5c51 01-03 17:56:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[5c52 01-03 17:56:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[5c53 01-03 17:56:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549 creator is valid
[5c54 01-03 17:56:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a a0 b9 ec 41 b6 d4 42 af a2 ef 73 6f 95 68 8a |*...A..B...so.h.|
00000010 de 3a d0 4a ca 6a 50 35 88 d2 84 bb 1d 84 ea d0 |.:.J.jP5........|
[5c55 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 1c 08 b8 a4 3a 31 d0 7d 31 67 98 |0D. u....:1.}1g.|
00000010 6e 80 61 5a a0 43 44 23 ed 36 2f fc 16 65 98 1f |n.aZ.CD#.6/..e..|
00000020 8b 42 57 c0 02 20 45 04 9f f4 a6 21 b9 25 39 e6 |.BW.. E....!.%9.|
00000030 0e b7 d9 c7 a4 11 7a 8d 8c 6f cf ad 83 8a 6b aa |......z..o....k.|
00000040 f3 72 e5 01 ce 5c |.r...\|
[5c56 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549 signature is valid
[5c57 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][50774e55] processing txid: 50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549
[5c58 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549]
[5c59 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x30, 0x37, 0x37, 0x34, 0x65, 0x35, 0x35, 0x65, 0x33, 0x39, 0x37, 0x33, 0x35, 0x37, 0x30, 0x62, 0x30, 0x62, 0x31, 0x61, 0x34, 0x63, 0x64, 0x37, 0x63, 0x63, 0x61, 0x33, 0x65, 0x36, 0x61, 0x31, 0x31, 0x66, 0x33, 0x32, 0x65, 0x62, 0x63, 0x38, 0x64, 0x35, 0x38, 0x39, 0x36, 0x34, 0x66, 0x30, 0x35, 0x65, 0x32, 0x64, 0x66, 0x35, 0x35, 0x34, 0x31, 0x39, 0x33, 0x30, 0x35, 0x34, 0x39}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x30, 0x37, 0x37, 0x34, 0x65, 0x35, 0x35, 0x65, 0x33, 0x39, 0x37, 0x33, 0x35, 0x37, 0x30, 0x62, 0x30, 0x62, 0x31, 0x61, 0x34, 0x63, 0x64, 0x37, 0x63, 0x63, 0x61, 0x33, 0x65, 0x36, 0x61, 0x31, 0x31, 0x66, 0x33, 0x32, 0x65, 0x62, 0x63, 0x38, 0x64, 0x35, 0x38, 0x39, 0x36, 0x34, 0x66, 0x30, 0x35, 0x65, 0x32, 0x64, 0x66, 0x35, 0x35, 0x34, 0x31, 0x39, 0x33, 0x30, 0x35, 0x34, 0x39, 0xff}]
[5c5a 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[5c5b 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549]
[5c5c 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][50774e55] Entry chaincode: _lifecycle
[5c5d 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][50774e55] Entry chaincode: _lifecycle
[5c5e 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] getting chaincode data for _lifecycle on channel businesschannel
[5c5f 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[5c60 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a a0 b9 ec 41 b6 d4 42 af a2 ef 73 6f 95 68 8a |*...A..B...so.h.|
00000010 de 3a d0 4a ca 6a 50 35 88 d2 84 bb 1d 84 ea d0 |.:.J.jP5........|
[5c61 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 1c 08 b8 a4 3a 31 d0 7d 31 67 98 |0D. u....:1.}1g.|
00000010 6e 80 61 5a a0 43 44 23 ed 36 2f fc 16 65 98 1f |n.aZ.CD#.6/..e..|
00000020 8b 42 57 c0 02 20 45 04 9f f4 a6 21 b9 25 39 e6 |.BW.. E....!.%9.|
00000030 0e b7 d9 c7 a4 11 7a 8d 8c 6f cf ad 83 8a 6b aa |......z..o....k.|
00000040 f3 72 e5 01 ce 5c |.r...\|
[5c62 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[5c63 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[5c64 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'
[5c65 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[5c66 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling GET_STATE from chaincode
[5c67 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel
[5c68 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[5c69 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload
[5c6a 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed GET_STATE. Sending RESPONSE
[5c6b 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[5c6c 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling GET_STATE from chaincode
[5c6d 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[5c6e 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[5c6f 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[5c70 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[5c71 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1
[5c72 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[5c73 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload
[5c74 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed GET_STATE. Sending RESPONSE
[5c75 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[5c76 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling PUT_STATE from chaincode
[5c77 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed PUT_STATE. Sending RESPONSE
[5c78 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[5c79 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling PUT_STATE from chaincode
[5c7a 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed PUT_STATE. Sending RESPONSE
[5c7b 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[5c7c 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling PUT_STATE from chaincode
[5c7d 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed PUT_STATE. Sending RESPONSE
[5c7e 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[5c7f 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling PUT_STATE from chaincode
[5c80 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed PUT_STATE. Sending RESPONSE
[5c81 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[5c82 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling GET_STATE from chaincode
[5c83 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel
[5c84 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1
[5c85 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'
[5c86 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload
[5c87 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed GET_STATE. Sending RESPONSE
[5c88 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[5c89 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling PUT_STATE from chaincode
[5c8a 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed PUT_STATE. Sending RESPONSE
[5c8b 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[5c8c 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] handling PUT_STATE from chaincode
[5c8d 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Completed PUT_STATE. Sending RESPONSE
[5c8e 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> INFO successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'
[5c8f 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[5c90 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU [50774e55] notifying Txid:50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549, channelID:businesschannel
[5c91 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[5c92 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][50774e55] Exit chaincode: _lifecycle (6ms)
[5c93 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[5c94 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549]
[5c95 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[5c96 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Computing dissemination plan for collection [_implicit_org_Org1MSP]
[5c97 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[5c98 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5c99 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c9a 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45200 gate 1578074209318056700 evaluation starts
[5c9b 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45200 signed by 0 principal evaluation starts (used [false])
[5c9c 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45200 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[5c9d 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45200 principal evaluation succeeds for identity 0
[5c9e 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45200 gate 1578074209318056700 evaluation succeeds
[5c9f 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5ca0 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151047
[5ca1 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 15F202B03D7524EEC41D9C4457E8DABC09C3396D9195B43C283D2C66B25B45A6
[5ca2 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5ca3 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5ca4 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ca5 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[5ca6 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ca7 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[5ca8 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[5ca9 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[5caa 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cab 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5cac 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cad 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5cae 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5caf 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5cb0 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5cb1 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cb2 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5cb3 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5cb4 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 25 31 14 0b 21 93 77 f9 57 70 bd f4 5e 5e 86 |.%1..!.w.Wp..^^.|
00000010 1e 19 d2 72 91 b7 3c 4a aa 3e 82 87 76 9f fe d2 |...r..<J.>..v...|
[5cb5 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 2d dc 04 61 67 9d fe 27 b5 07 72 |0D. @-..ag..'..r|
00000010 1b 37 33 2f 59 ef 19 94 45 9b 90 40 7a 4e ee a5 |.73/Y...E..@zN..|
00000020 8d 0c da 78 02 20 5e ff d7 3b 93 46 e8 03 bc 29 |...x. ^..;.F...)|
00000030 b3 54 2d a6 b3 bd 97 2b 10 3c 39 f3 fd 73 a3 ce |.T-....+.<9..s..|
00000040 27 e5 58 7c 72 b2 |'.X|r.|
[5cb6 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[5cb7 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cb8 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5cb9 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cba 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5cbb 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5cbc 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5cbd 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5cbe 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5cbf 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5cc0 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 ec 7f ce f9 a2 24 d3 03 99 7c 31 23 1c ac b2 |s.....$...|1#...|
00000010 d1 b1 a5 aa 23 bc 52 d4 84 23 2a 7d ae 55 61 2d |....#.R..#*}.Ua-|
[5cc1 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 4d 34 29 5c bc 43 8f 9f cc 32 |0E.!..M4)\.C...2|
00000010 52 3b e7 44 73 a0 54 1b 4a aa 63 01 16 20 45 72 |R;.Ds.T.J.c.. Er|
00000020 20 29 50 a1 5b 02 20 79 72 44 e3 62 bb a2 54 3c | )P.[. yrD.b..T<|
00000030 3e bd 65 3d ec 59 01 1b 70 75 2a 40 b0 86 8d cd |>.e=.Y..pu*@....|
00000040 00 ed c8 71 61 be 42 |...qa.B|
[5cc2 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5cc3 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f670 gate 1578074209327396400 evaluation starts
[5cc4 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f670 signed by 0 principal evaluation starts (used [false])
[5cc5 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f670 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5cc6 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5cc7 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f670 principal evaluation fails
[5cc8 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f670 gate 1578074209327396400 evaluation fails
[5cc9 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5cca 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5ccb 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5ccc 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 ec 7f ce f9 a2 24 d3 03 99 7c 31 23 1c ac b2 |s.....$...|1#...|
00000010 d1 b1 a5 aa 23 bc 52 d4 84 23 2a 7d ae 55 61 2d |....#.R..#*}.Ua-|
[5ccd 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 4d 34 29 5c bc 43 8f 9f cc 32 |0E.!..M4)\.C...2|
00000010 52 3b e7 44 73 a0 54 1b 4a aa 63 01 16 20 45 72 |R;.Ds.T.J.c.. Er|
00000020 20 29 50 a1 5b 02 20 79 72 44 e3 62 bb a2 54 3c | )P.[. yrD.b..T<|
00000030 3e bd 65 3d ec 59 01 1b 70 75 2a 40 b0 86 8d cd |>.e=.Y..pu*@....|
00000040 00 ed c8 71 61 be 42 |...qa.B|
[5cce 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5ccf 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ff70 gate 1578074209328121800 evaluation starts
[5cd0 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ff70 signed by 0 principal evaluation starts (used [false])
[5cd1 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ff70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5cd2 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ff70 principal evaluation succeeds for identity 0
[5cd3 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ff70 gate 1578074209328121800 evaluation succeeds
[5cd4 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5cd5 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5cd6 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5cd7 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5cd8 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5cd9 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cda 01-03 17:56:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5cdb 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 f2 02 b0 3d 75 24 ee c4 1d 9c 44 57 e8 da bc |....=u$....DW...|
00000010 09 c3 39 6d 91 95 b4 3c 28 3d 2c 66 b2 5b 45 a6 |..9m...<(=,f.[E.|
[5cdc 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 b2 0d 7c f4 a5 00 13 3f 95 43 71 |0D. ...|....?.Cq|
00000010 1f 8e 7b 58 69 13 6f 52 1a 38 23 7e 51 40 1f f6 |..{Xi.oR.8#~Q@..|
00000020 12 37 d9 de 02 20 17 1b 7a 11 41 c6 52 1b d1 ee |.7... ..z.A.R...|
00000030 99 da 50 39 ad 71 8e 2c db 1c 15 c8 1c b1 24 fc |..P9.q.,......$.|
00000040 7a 47 b8 1c 2f 61 |zG../a|
[5cdd 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5cde 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5cdf 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ce0 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ce1 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[5ce2 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[5ce3 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ce4 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[5ce5 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5ce6 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ce7 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5ce8 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5ce9 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5cea 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5ceb 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5cec 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5ced 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a ab 8f 89 6c cb 0a 7d 4b da bb 52 95 2d 01 8b |z...l..}K..R.-..|
00000010 49 d6 ab eb a0 81 ab db 9a e4 0e 9e 9f 96 c9 3a |I..............:|
[5cee 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 64 f5 12 27 55 16 c7 94 1e b2 25 |0D. dd..'U.....%|
00000010 8a 3f 04 aa e5 b8 c7 56 ec e0 ad 9b 3f 75 6c 7a |.?.....V....?ulz|
00000020 2e 6d 2c 90 02 20 38 88 18 d5 5b c6 85 d3 71 53 |.m,.. 8...[...qS|
00000030 53 2f 7c 87 05 d6 b8 e7 ad 7e 03 f9 3f 55 07 ba |S/|......~..?U..|
00000040 b4 1f be f7 e9 51 |.....Q|
[5cef 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5cf0 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b40 gate 1578074209335977800 evaluation starts
[5cf1 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b40 signed by 0 principal evaluation starts (used [false])
[5cf2 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5cf3 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5cf4 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b40 principal evaluation fails
[5cf5 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b40 gate 1578074209335977800 evaluation fails
[5cf6 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5cf7 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5cf8 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5cf9 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a ab 8f 89 6c cb 0a 7d 4b da bb 52 95 2d 01 8b |z...l..}K..R.-..|
00000010 49 d6 ab eb a0 81 ab db 9a e4 0e 9e 9f 96 c9 3a |I..............:|
[5cfa 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 64 f5 12 27 55 16 c7 94 1e b2 25 |0D. dd..'U.....%|
00000010 8a 3f 04 aa e5 b8 c7 56 ec e0 ad 9b 3f 75 6c 7a |.?.....V....?ulz|
00000020 2e 6d 2c 90 02 20 38 88 18 d5 5b c6 85 d3 71 53 |.m,.. 8...[...qS|
00000030 53 2f 7c 87 05 d6 b8 e7 ad 7e 03 f9 3f 55 07 ba |S/|......~..?U..|
00000040 b4 1f be f7 e9 51 |.....Q|
[5cfb 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5cfc 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3440 gate 1578074209336576400 evaluation starts
[5cfd 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3440 signed by 0 principal evaluation starts (used [false])
[5cfe 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3440 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5cff 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3440 principal evaluation succeeds for identity 0
[5d00 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3440 gate 1578074209336576400 evaluation succeeds
[5d01 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5d02 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5d03 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5d04 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5d05 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[5d06 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d07 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5d08 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[5d09 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 25 31 14 0b 21 93 77 f9 57 70 bd f4 5e 5e 86 |.%1..!.w.Wp..^^.|
00000010 1e 19 d2 72 91 b7 3c 4a aa 3e 82 87 76 9f fe d2 |...r..<J.>..v...|
[5d0a 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 2d dc 04 61 67 9d fe 27 b5 07 72 |0D. @-..ag..'..r|
00000010 1b 37 33 2f 59 ef 19 94 45 9b 90 40 7a 4e ee a5 |.73/Y...E..@zN..|
00000020 8d 0c da 78 02 20 5e ff d7 3b 93 46 e8 03 bc 29 |...x. ^..;.F...)|
00000030 b3 54 2d a6 b3 bd 97 2b 10 3c 39 f3 fd 73 a3 ce |.T-....+.<9..s..|
00000040 27 e5 58 7c 72 b2 |'.X|r.|
[5d0b 01-03 17:56:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5d0c 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d0d 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45810 gate 1578074209339250400 evaluation starts
[5d0e 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45810 signed by 0 principal evaluation starts (used [false])
[5d0f 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45810 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5d10 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5d11 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45810 principal evaluation fails
[5d12 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45810 gate 1578074209339250400 evaluation fails
[5d13 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5d14 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5d15 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d16 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8020 gate 1578074209339750800 evaluation starts
[5d17 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8020 signed by 0 principal evaluation starts (used [false])
[5d18 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8020 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5d19 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5d1a 01-03 17:56:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8020 principal evaluation fails
[5d1b 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8020 gate 1578074209339750800 evaluation fails
[5d1c 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Disseminating private RWSet for TxID [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549] namespace [_lifecycle] collection [_implicit_org_Org1MSP] to peers: []
[5d1d 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Persisting private data to transient store for txid [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549] at block height [3]
[5d1e 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[5d1f 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d20 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5d21 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 f2 02 b0 3d 75 24 ee c4 1d 9c 44 57 e8 da bc |....=u$....DW...|
00000010 09 c3 39 6d 91 95 b4 3c 28 3d 2c 66 b2 5b 45 a6 |..9m...<(=,f.[E.|
[5d22 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 b2 0d 7c f4 a5 00 13 3f 95 43 71 |0D. ...|....?.Cq|
00000010 1f 8e 7b 58 69 13 6f 52 1a 38 23 7e 51 40 1f f6 |..{Xi.oR.8#~Q@..|
00000020 12 37 d9 de 02 20 17 1b 7a 11 41 c6 52 1b d1 ee |.7... ..z.A.R...|
00000030 99 da 50 39 ad 71 8e 2c db 1c 15 c8 1c b1 24 fc |..P9.q.,......$.|
00000040 7a 47 b8 1c 2f 61 |zG../a|
[5d23 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5d24 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5d25 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d26 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549]
[5d27 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][50774e55] Exit
[5d28 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][50774e55] escc for chaincode _lifecycle is escc
[5d29 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20D2D6FB8DA24673DDF519C4B505DF...455254494649434154452D2D2D2D2D0A
[5d2a 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6DF4D2DA232148F84FC14F1AC5288C08A1C3965FC65F9B35A7EAB09D4E14B15F
[5d2b 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549]
[5d2c 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57536
[5d2d 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57536 grpc.code=OK grpc.call_duration=35.659ms
[5d2e 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Starting new DeliverFiltered handler
[5d2f 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Starting new deliver loop for 172.18.0.9:57538
[5d30 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to read seek info message from 172.18.0.9:57538
[5d31 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock
[5d32 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[5d33 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5d34 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5d35 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5d36 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 a0 b4 dd ab 4d d7 7d 9e f8 4f f3 60 74 78 94 |a....M.}..O.`tx.|
00000010 e5 09 2b 15 0e be 3d bb e9 89 06 61 79 66 71 de |..+...=....ayfq.|
[5d37 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 d4 03 a1 94 d9 c3 0a 2a 18 16 08 |0D. '.......*...|
00000010 07 51 31 0c cf 46 ca 2e ca 55 2a a8 12 40 43 bb |.Q1..F...U*..@C.|
00000020 fb a7 66 e0 02 20 1f a9 3e e7 e9 22 ea 7b 0c e0 |..f.. ..>..".{..|
00000030 4b 33 a9 aa b2 a6 23 78 cb c9 bc 57 9f 62 6e 8b |K3....#x...W.bn.|
00000040 d4 25 dd 9b 4f 33 |.%..O3|
[5d38 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d39 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9e60 gate 1578074209358929500 evaluation starts
[5d3a 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9e60 signed by 0 principal evaluation starts (used [false])
[5d3b 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9e60 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[5d3c 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[5d3d 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[5d3e 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9e60 principal evaluation succeeds for identity 0
[5d3f 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9e60 gate 1578074209358929500 evaluation succeeds
[5d40 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[5d41 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5d42 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5d43 01-03 17:56:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5d44 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Received seekInfo (0xc002f6bb80) start:<newest:<> > stop:<specified:<number:18446744073709551615 > > from 172.18.0.9:57538
[5d45 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing block stream for iterator. itr.maxBlockNumAvailable=2
[5d47 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47654]
[5d46 01-03 17:56:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d48 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[23768], Going to peek [8] bytes
[5d49 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[5d4a 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d4b 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[5d4c 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 f2 02 b0 3d 75 24 ee c4 1d 9c 44 57 e8 da bc |....=u$....DW...|
00000010 09 c3 39 6d 91 95 b4 3c 28 3d 2c 66 b2 5b 45 a6 |..9m...<(=,f.[E.|
[5d4e 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 b2 0d 7c f4 a5 00 13 3f 95 43 71 |0D. ...|....?.Cq|
00000010 1f 8e 7b 58 69 13 6f 52 1a 38 23 7e 51 40 1f f6 |..{Xi.oR.8#~Q@..|
00000020 12 37 d9 de 02 20 17 1b 7a 11 41 c6 52 1b d1 ee |.7... ..z.A.R...|
00000030 99 da 50 39 ad 71 8e 2c db 1c 15 c8 1c b1 24 fc |..P9.q.,......$.|
00000040 7a 47 b8 1c 2f 61 |zG../a|
[5d4d 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[23765], placementInfo={fileNum=[0], startOffset=[47654], bytesOffset=[47657]}
[5d4f 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU blockbytes [23765] read from file [0]
[5d50 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Delivering block [2] for (0xc002f6bb80) for 172.18.0.9:57538
[5d51 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]
[5d52 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[5d53 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 93 dd dd f7 2a 97 d3 31 09 a7 cf |0D. }....*..1...|
00000010 c6 10 7c 47 73 d7 1e ee 13 8d cc 75 3c bf cd 5c |..|Gs......u<..\|
00000020 f3 c4 41 36 02 20 25 a2 3b 9b 32 19 73 6c b9 ba |..A6. %.;.2.sl..|
00000030 00 7b c0 26 6f bf e3 03 4a bb b8 89 41 b3 3d b3 |.{.&o...J...A.=.|
00000040 60 1f de 4c 4d 34 |`..LM4|
[5d54 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5d55 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5d56 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d57 01-03 17:56:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d58 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d59 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d5a 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[5d5b 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[5d5c 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d5d 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[5d5e 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[5d5f 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d60 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d61 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5d62 01-03 17:56:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5d63 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5d64 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[5d65 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5d66 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[5d67 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[5d68 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d69 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d6a 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5d6b 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5d6c 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5d6d 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5d6e 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5d6f 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5d70 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5d71 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5d72 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d73 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51290 gate 1578074209389732600 evaluation starts
[5d74 01-03 17:56:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51290 signed by 0 principal evaluation starts (used [false])
[5d75 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51290 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5d76 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5d77 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51290 principal evaluation fails
[5d78 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51290 gate 1578074209389732600 evaluation fails
[5d79 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5d7a 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5d7b 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5d7c 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5d7d 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5d7e 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d7f 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51b90 gate 1578074209393007400 evaluation starts
[5d80 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51b90 signed by 0 principal evaluation starts (used [false])
[5d81 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51b90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5d82 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51b90 principal evaluation succeeds for identity 0
[5d83 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51b90 gate 1578074209393007400 evaluation succeeds
[5d84 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5d85 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5d86 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5d87 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5d88 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d89 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d8a 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5d8b 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5d8c 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5d8d 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5d8e 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5d8f 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5d90 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5d91 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5d92 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d93 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b695f0 gate 1578074209398100400 evaluation starts
[5d94 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b695f0 signed by 0 principal evaluation starts (used [false])
[5d95 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b695f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5d96 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b695f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5d97 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b695f0 principal evaluation fails
[5d98 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b695f0 gate 1578074209398100400 evaluation fails
[5d99 01-03 17:56:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5d9a 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5d9b 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5d9c 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5d9d 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5d9e 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d9f 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69ef0 gate 1578074209401391000 evaluation starts
[5da0 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69ef0 signed by 0 principal evaluation starts (used [false])
[5da1 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69ef0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5da2 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69ef0 principal evaluation succeeds for identity 0
[5da3 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69ef0 gate 1578074209401391000 evaluation succeeds
[5da4 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5da5 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5da6 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5da7 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5da8 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5da9 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5daa 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dab 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dac 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dad 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5dae 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5daf 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5db0 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5db1 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5db2 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5db3 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5db4 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5db5 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5db6 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81c00 gate 1578074209407465300 evaluation starts
[5db7 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81c00 signed by 0 principal evaluation starts (used [false])
[5db8 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81c00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5db9 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5dba 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81c00 principal evaluation fails
[5dbb 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81c00 gate 1578074209407465300 evaluation fails
[5dbc 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5dbd 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5dbe 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5dbf 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5dc0 01-03 17:56:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5dc1 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5dc2 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98500 gate 1578074209410624100 evaluation starts
[5dc3 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98500 signed by 0 principal evaluation starts (used [false])
[5dc4 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98500 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5dc5 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98500 principal evaluation succeeds for identity 0
[5dc6 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b98500 gate 1578074209410624100 evaluation succeeds
[5dc7 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5dc8 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5dc9 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5dca 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5dcb 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[5dcc 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[5dcd 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[5dce 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5dcf 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dd0 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dd1 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5dd2 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5dd3 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5dd4 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5dd5 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5dd6 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5dd7 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5dd8 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5dd9 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5dda 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baccc0 gate 1578074209418534700 evaluation starts
[5ddb 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baccc0 signed by 0 principal evaluation starts (used [false])
[5ddc 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baccc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5ddd 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baccc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5dde 01-03 17:56:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baccc0 principal evaluation fails
[5ddf 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baccc0 gate 1578074209418534700 evaluation fails
[5de0 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5de1 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5de2 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5de3 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5de4 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5de5 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5de6 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad5c0 gate 1578074209422547400 evaluation starts
[5de7 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad5c0 signed by 0 principal evaluation starts (used [false])
[5de8 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad5c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5de9 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad5c0 principal evaluation succeeds for identity 0
[5dea 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad5c0 gate 1578074209422547400 evaluation succeeds
[5deb 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5dec 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5ded 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5dee 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5def 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5df0 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[5df1 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5df2 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5df3 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5df4 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5df5 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5df6 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5df7 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5df8 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5df9 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5dfa 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5dfb 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5dfc 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5dfd 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc52d0 gate 1578074209428105200 evaluation starts
[5dfe 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc52d0 signed by 0 principal evaluation starts (used [false])
[5dff 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc52d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5e00 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc52d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5e01 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc52d0 principal evaluation fails
[5e02 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc52d0 gate 1578074209428105200 evaluation fails
[5e03 01-03 17:56:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5e04 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5e05 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5e06 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[5e07 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[5e08 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e09 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc5bd0 gate 1578074209431199000 evaluation starts
[5e0a 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc5bd0 signed by 0 principal evaluation starts (used [false])
[5e0b 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc5bd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5e0c 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc5bd0 principal evaluation succeeds for identity 0
[5e0d 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc5bd0 gate 1578074209431199000 evaluation succeeds
[5e0e 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5e0f 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5e10 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5e11 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5e12 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[5e13 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[5e14 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e15 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e16 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5e17 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5e18 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5e19 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5e1a 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5e1b 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5e1c 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5e1d 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5e1e 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e1f 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdbce0 gate 1578074209437000200 evaluation starts
[5e20 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdbce0 signed by 0 principal evaluation starts (used [false])
[5e21 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdbce0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5e22 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdbce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5e23 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdbce0 principal evaluation fails
[5e24 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bdbce0 gate 1578074209437000200 evaluation fails
[5e25 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5e26 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5e27 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5e28 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[5e29 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[5e2a 01-03 17:56:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e2b 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bec5e0 gate 1578074209440674500 evaluation starts
[5e2c 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bec5e0 signed by 0 principal evaluation starts (used [false])
[5e2d 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bec5e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5e2e 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bec5e0 principal evaluation succeeds for identity 0
[5e2f 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bec5e0 gate 1578074209440674500 evaluation succeeds
[5e30 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5e31 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5e32 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5e33 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5e34 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[5e35 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[5e36 01-03 17:56:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e37 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e38 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e39 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[5e3a 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e3b 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e3c 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9115300224306983823 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[5e3d 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9115300224306983823 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5e3e 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e3f 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9115300224306983823 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[5e40 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9115300224306983823 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[5e41 01-03 17:56:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e42 01-03 17:56:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[5e43 01-03 17:56:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e44 01-03 17:56:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e45 01-03 17:56:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e46 01-03 17:56:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10157076041817605278 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5e47 01-03 17:56:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10157076041817605278 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5e48 01-03 17:56:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5e49 01-03 17:56:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e4a 01-03 17:56:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[5e4b 01-03 17:56:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[5e4c 01-03 17:56:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e4d 01-03 17:56:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e4e 01-03 17:56:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e4f 01-03 17:56:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e50 01-03 17:56:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[5e51 01-03 17:56:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[5e52 01-03 17:56:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e53 01-03 17:56:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e54 01-03 17:56:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e55 01-03 17:56:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e56 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5e57 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[5e58 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[5e59 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5e5a 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[5e5b 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e5c 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[5e5d 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 8a 0d 61 b8 1b 56 52 a1 2d 3f 2b 96 d6 7d 8d |-..a..VR.-?+..}.|
00000010 18 6b 48 64 dd 6a f7 0d 8c ba 27 8a 46 aa 02 84 |.kHd.j....'.F...|
[5e5e 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 8b b1 b5 14 22 f4 44 ac 3f a5 c9 |0D. ?....".D.?..|
00000010 ef 0a 7a 73 6c b4 39 61 d3 b1 00 67 7d 77 e4 36 |..zsl.9a...g}w.6|
00000020 07 57 72 f9 02 20 49 67 b9 19 bb 08 ca d8 63 3c |.Wr.. Ig......c<|
00000030 48 0a ae e2 fc 43 a1 93 da 82 35 a9 fc fe bf 32 |H....C....5....2|
00000040 7e f1 86 58 d9 ed |~..X..|
[5e5f 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e60 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d60 gate 1578074211394573400 evaluation starts
[5e61 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d60 signed by 0 principal evaluation starts (used [false])
[5e62 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d60 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[5e63 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP
[5e64 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[5e65 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d60 principal evaluation succeeds for identity 0
[5e66 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d60 gate 1578074211394573400 evaluation succeeds
[5e67 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[5e68 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[5e69 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[5e6a 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[5e6b 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [3] channel=businesschannel
[5e6c 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3]
[5e6d 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]
[5e6e 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger
[5e6f 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer
[5e70 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3]
[5e71 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3]
[5e72 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[5e73 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00323f4c0 env 0xc003bcfcc0 txn 0
[5e74 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003bcfcc0
[5e75 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\341\200\276\360\005\020\204\261\342\222\001\"\017businesschannel*@50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\240j\264\005\376\200\317\n\316g`\304U9\247\270\231\013\251\000\223\336\037P"
[5e76 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[5e77 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[5e78 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[5e79 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[5e7a 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[5e7b 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 60 ec f9 2a cb b2 4e 6a 18 b1 ea bf 3a 49 69 |y`..*..Nj....:Ii|
00000010 6d 31 34 81 eb 24 ac 86 2a 81 92 dc ce 31 88 37 |m14..$..*....1.7|
[5e7c 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 e9 2e 07 37 a3 fd 59 e3 21 6f fb |0D. @...7..Y.!o.|
00000010 ca de 7e e8 37 ce f5 8e 46 f0 a2 cf 3d f1 1e 0d |..~.7...F...=...|
00000020 4e 83 4a 59 02 20 02 57 df e9 65 d5 b7 29 40 c7 |N.JY. .W..e..)@.|
00000030 7a be 4b 3f 03 52 20 53 7e e1 04 ea b4 b5 a3 4c |z.K?.R S~......L|
00000040 2b a1 71 6f fb b7 |+.qo..|
[5e7d 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[5e7e 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003c44000, header channel_header:"\010\003\032\014\010\341\200\276\360\005\020\204\261\342\222\001\"\017businesschannel*@50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\240j\264\005\376\200\317\n\316g`\304U9\247\270\231\013\251\000\223\336\037P"
[5e7f 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[5e80 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[5e81 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[5e82 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[5e83 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549]
[5e84 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x30, 0x37, 0x37, 0x34, 0x65, 0x35, 0x35, 0x65, 0x33, 0x39, 0x37, 0x33, 0x35, 0x37, 0x30, 0x62, 0x30, 0x62, 0x31, 0x61, 0x34, 0x63, 0x64, 0x37, 0x63, 0x63, 0x61, 0x33, 0x65, 0x36, 0x61, 0x31, 0x31, 0x66, 0x33, 0x32, 0x65, 0x62, 0x63, 0x38, 0x64, 0x35, 0x38, 0x39, 0x36, 0x34, 0x66, 0x30, 0x35, 0x65, 0x32, 0x64, 0x66, 0x35, 0x35, 0x34, 0x31, 0x39, 0x33, 0x30, 0x35, 0x34, 0x39}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x30, 0x37, 0x37, 0x34, 0x65, 0x35, 0x35, 0x65, 0x33, 0x39, 0x37, 0x33, 0x35, 0x37, 0x30, 0x62, 0x30, 0x62, 0x31, 0x61, 0x34, 0x63, 0x64, 0x37, 0x63, 0x63, 0x61, 0x33, 0x65, 0x36, 0x61, 0x31, 0x31, 0x66, 0x33, 0x32, 0x65, 0x62, 0x63, 0x38, 0x64, 0x35, 0x38, 0x39, 0x36, 0x34, 0x66, 0x30, 0x35, 0x65, 0x32, 0x64, 0x66, 0x35, 0x35, 0x34, 0x31, 0x39, 0x33, 0x30, 0x35, 0x34, 0x39, 0xff}]
[5e85 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[5e86 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc003c38000
[5e87 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4aa737e3-8c71-4df9-affa-5573daf47a3e]
[5e89 01-03 17:56:51.39 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[5e88 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4aa737e3-8c71-4df9-affa-5573daf47a3e]
[5e8b 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin
[5e8a 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [3] channel=businesschannel
[5e8c 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2c4c882f-5dc6-49f9-848c-1bd41f395cab]
[5e8d 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4756 bytes, seq: 3}, Envelope: 4786 bytes, Signature: 0 bytes to the block puller
[5e8e 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3
[5e8f 01-03 17:56:51.40 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[5e90 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[5e91 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2c4c882f-5dc6-49f9-848c-1bd41f395cab]
[5e92 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [043a26e3-d436-4ad0-b63b-21865416aa12]
[5e93 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [043a26e3-d436-4ad0-b63b-21865416aa12]
[5e94 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==
[5e95 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e96 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[5e97 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d f4 d2 da 23 21 48 f8 4f c1 4f 1a c5 28 8c 08 |m...#!H.O.O..(..|
00000010 a1 c3 96 5f c6 5f 9b 35 a7 ea b0 9d 4e 14 b1 5f |..._._.5....N.._|
[5e98 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 02 c6 f7 41 76 ae 93 0b 44 2d d7 |0D. ...Av...D-.|
00000010 8e 52 80 28 fe 97 29 33 97 bd a7 7f 8f b4 11 0d |.R.(..)3........|
00000020 05 0c 29 95 02 20 37 18 e4 12 b4 e9 43 f5 84 d8 |..).. 7.....C...|
00000030 92 03 9e 65 c3 65 fe 2d 0f af 40 21 43 a4 f4 58 |...e.e.-..@!C..X|
00000040 b3 61 b5 49 e0 6c |.a.I.l|
[5e99 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e9a 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ca80 gate 1578074211413510800 evaluation starts
[5e9b 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ca80 signed by 0 principal evaluation starts (used [false])
[5e9c 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ca80 processing identity 0 - &{Org1MSP 72d14a8ffb3355b2cd5ce4f5575706e3d93f82ccf34f87f37b6ede3c9fbcf9a5}
[5e9d 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[5e9e 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[5e9f 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[5ea0 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ca80 principal evaluation succeeds for identity 0
[5ea1 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ca80 gate 1578074211413510800 evaluation succeeds
[5ea2 01-03 17:56:51.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement
[5ea3 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement
[5ea4 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ea5 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [bf28b1dd-2b82-4322-b14f-00f0e95d6bd3]
[5ea6 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ea8 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ea9 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5eaa 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4756 bytes, seq: 3}, Envelope: 4786 bytes, Signature: 0 bytes to 1 peers
[5eab 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5eac 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ead 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4756 bytes, seq: 3}, Envelope: 4786 bytes, Signature: 0 bytes
[5eae 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ea7 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[5eaf 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[5eb0 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [bf28b1dd-2b82-4322-b14f-00f0e95d6bd3]
[5eb1 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6e693932-e44d-4c90-b961-4a679e2a566f]
[5eb2 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[5eb3 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[5eb4 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6e693932-e44d-4c90-b961-4a679e2a566f]
[5eb5 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ab952312-757a-4486-85ff-87618ae277bc]
[5eb6 01-03 17:56:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[5eb7 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[5eb8 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ab952312-757a-4486-85ff-87618ae277bc]
[5eb9 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4aad45d5-beec-4439-898d-4a0181ec62eb]
[5eba 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[5ebb 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[5ebc 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4aad45d5-beec-4439-898d-4a0181ec62eb]
[5ebd 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ab1ed550-083d-446c-b020-bd087e0eacab]
[5ebe 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[5ebf 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[5ec0 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ab1ed550-083d-446c-b020-bd087e0eacab]
[5ec1 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: _lifecycle, tx 0 validation results is: <nil>
[5ec2 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549 appears to be valid
[5ec3 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc003c38000
[5ec4 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00323f4c0 env 0xc003bcfcc0 txn 0
[5ec5 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[5ec6 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 36ms
[5ec7 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [447e118b-f194-4811-8091-fa561f3cf0ce]
[5ec8 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [447e118b-f194-4811-8091-fa561f3cf0ce]
[5ec9 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[5eca 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... |
00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|
[5ecb 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 df 1b c5 8d f0 50 72 47 39 7a 65 |0D. Y.....PrG9ze|
00000010 6a 4e 5c f8 fd b2 0b ae 36 ca ec 4e 6f 6c e3 c0 |jN\.....6..Nol..|
00000020 8e 39 4c 40 02 20 76 97 e3 3e ed 0a ab 0d 76 e4 |.9L@. v..>....v.|
00000030 09 21 48 67 03 87 b7 a5 0e ad d3 51 4d 48 61 08 |.!Hg.......QMHa.|
00000040 3d 8a 34 dc 71 98 |=.4.q.|
[5ecc 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5ecd 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c83c70 gate 1578074211438583000 evaluation starts
[5ece 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c83c70 signed by 0 principal evaluation starts (used [false])
[5ecf 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c83c70 processing identity 0 - &{Org1MSP 72d14a8ffb3355b2cd5ce4f5575706e3d93f82ccf34f87f37b6ede3c9fbcf9a5}
[5ed0 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c83c70 principal evaluation succeeds for identity 0
[5ed1 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c83c70 gate 1578074211438583000 evaluation succeeds
[5ed2 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 1 private write sets from cache. channel=businesschannel
[5ed3 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Could not find all collection private write sets in cache for block [3] channel=businesschannel
[5ed4 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetching 1 collection private write sets from transient store channel=businesschannel
[5ed5 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 1 private write sets from transient store. channel=businesschannel
[5ed6 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting private data from transient store for transaction 50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549
[5ed7 01-03 17:56:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x35, 0x30, 0x37, 0x37, 0x34, 0x65, 0x35, 0x35, 0x65, 0x33, 0x39, 0x37, 0x33, 0x35, 0x37, 0x30, 0x62, 0x30, 0x62, 0x31, 0x61, 0x34, 0x63, 0x64, 0x37, 0x63, 0x63, 0x61, 0x33, 0x65, 0x36, 0x61, 0x31, 0x31, 0x66, 0x33, 0x32, 0x65, 0x62, 0x63, 0x38, 0x64, 0x35, 0x38, 0x39, 0x36, 0x34, 0x66, 0x30, 0x35, 0x65, 0x32, 0x64, 0x66, 0x35, 0x35, 0x34, 0x31, 0x39, 0x33, 0x30, 0x35, 0x34, 0x39, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x35, 0x30, 0x37, 0x37, 0x34, 0x65, 0x35, 0x35, 0x65, 0x33, 0x39, 0x37, 0x33, 0x35, 0x37, 0x30, 0x62, 0x30, 0x62, 0x31, 0x61, 0x34, 0x63, 0x64, 0x37, 0x63, 0x63, 0x61, 0x33, 0x65, 0x36, 0x61, 0x31, 0x31, 0x66, 0x33, 0x32, 0x65, 0x62, 0x63, 0x38, 0x64, 0x35, 0x38, 0x39, 0x36, 0x34, 0x66, 0x30, 0x35, 0x65, 0x32, 0x64, 0x66, 0x35, 0x35, 0x34, 0x31, 0x39, 0x33, 0x30, 0x35, 0x34, 0x39, 0xff}]
[5ed8 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from remote peers channel=businesschannel
[5ed9 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [3] channel=businesschannel
[5eda 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3]
[5edb 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[5edc 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[5edd 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[5ede 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3]
[5edf 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[5ee0 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[5ee1 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[5ee2 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[5ee3 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[5ee4 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[5ee5 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'
[5ee6 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[5ee7 01-03 17:56:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[5ee8 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[5ee9 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549] marked as valid by state validator. ContainsPostOrderWrites [false]
[5eea 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc003307980), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc003307a40), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc003307900), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc003307940), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4<k\xbe\x06\f\xfcG4\x15\xdc\xc8\x17\xa4ψ\xe6\x8a\xc9.ܿ"}:(*internal.keyOps)(0xc003307a00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc0033079c0)}
[5eeb 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[5eec 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[5eed 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[5eee 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408908FF491D1C09CF315...624D0F542C442AB5FE8C65C22A020803
[5eef 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ADFF0771CAEF56D33F9A072E798E3D3C42708C31F23645D4047CA745ACC605AA
[5ef0 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0xc00031a4e0 0xc0003382e0 0xc000334b20 0xc0000100d0}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[<5B>;<3B>A<EFBFBD><41><EFBFBD><EFBFBD>TU FEX<45><58>ղ<><D5B2><EFBFBD>I‹<49>\<5C>.(<28>:%!s(*lifecycle.LocalChaincode=&{0xc002ec6a00 map[]})] %!s(*lifecycle.EventBroker=&{0xc0003382e0 0xc0002d7ee0 0xc000334b20 0xc0002df740 {0 0} map[]}) %!s(*lifecycle.MetadataManager=&{{0 0} [0x15f73f0] map[businesschannel:[]] map[businesschannel:[]]}) %!s(*lifecycle.ChaincodeCustodian=&{0xc000438640 {0 0} [] false})}
[5ef1 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}
[5ef2 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]
[5ef3 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88})}
[5ef4 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 181 188 186 246 204 200 82 24 163 18 115 169 243 165 172 145 130 171 21 5 18 41 65 247 176 146 208 82 173 105 156 166 2 32 11 83 173 30 184 150 36 95 0 210 3 48 155 20 156 229 137 3 95 230 99 168 92 201 143 203 217 20 86 75 192 120]} 0x15f7150}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc000267380 0xc000123a40 {{0 0} 0 0 0 0} {false}})]}
[5ef5 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88}) %!s(*confighistory.dbProvider=&{0xc00087ac00})}
[5ef6 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3]
[5ef7 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage
[5ef8 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store
[5ef9 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [c3506a0f-1d96-44b7-877e-a1c397e030f1]
[5efa 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c3506a0f-1d96-44b7-877e-a1c397e030f1]
[5efb 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3]
[5efc 01-03 17:56:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3]
[5efd 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[5efe 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[5eff 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315101A1801
[5f00 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA220DE4A182BFF35016753B5A7A0CC360C4EB4E2A9897747DF3CA43040EBE64
[5f01 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[5f02 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x45, 0x16, 0x5e, 0xbf, 0x60, 0xc, 0x33, 0x10, 0x13, 0x1f, 0x30, 0xd, 0xc2, 0x99, 0x18, 0x46, 0xd1, 0x1c, 0x18, 0xdc, 0x8f, 0x24, 0xd7, 0x85, 0xe0, 0xf5, 0xb, 0x65, 0x9d, 0x78, 0x53, 0x49} txOffsets=
txId=50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549 locPointer=offset=70, bytesLength=3747
]
[5f03 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=71492, bytesLength=3747] for tx ID: [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549] to txid-index
[5f04 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=71492, bytesLength=3747] for tx number:[0] ID: [50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549] to blockNumTranNum index
[5f05 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76200], isChainEmpty=[false], lastBlockNumber=[3]
[5f06 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database
[5f08 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[5f09 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f0b 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f0a 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[5f0c 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f0d 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f0e 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:26 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[5f0f 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f10 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f11 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:26 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[5f12 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f13 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[5f07 01-03 17:56:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Came out of wait. maxAvailaBlockNumber=[3]
[5f14 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[4778], Going to peek [8] bytes
[5f15 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[4776], placementInfo={fileNum=[0], startOffset=[71422], bytesOffset=[71424]}
[5f16 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU blockbytes [4776] read from file [0]
[5f17 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]
[5f18 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]
[5f19 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]
[5f1a 01-03 17:56:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]
[5f1b 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]
[5f1c 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]
[5f1d 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[5f1e 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP<00><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe5, 0x92, 0x1f, 0x81, 0x52, 0xdf, 0xf6, 0x8c, 0x18, 0x6c, 0xa4, 0x3c, 0x6b, 0xbe, 0x6, 0xc, 0xfc, 0x47, 0x34, 0x15, 0xdc, 0xc8, 0x17, 0xa4, 0xcf, 0x88, 0xe6, 0x8a, 0xc9, 0x2e, 0xdc, 0xbf}]
[5f1f 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP<00><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]
[5f21 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP<00><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]
[5f22 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]
[5f23 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP<00><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]
[5f24 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]
[5f25 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]
[5f26 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]
[5f27 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]
[5f28 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]
[5f29 01-03 17:56:51.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]
[5f2a 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got GossipMessage: nonce:1755095923199780683 channel:"businesschannel" tag:CHAN_ONLY privateReq:<digests:<tx_id:"50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549" namespace:"_lifecycle" collection:"_implicit_org_Org1MSP" block_seq:3 > > , Envelope: 137 bytes, Signature: 0 bytes from 172.18.0.5:57826
[5f2b 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[5f2c 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[5f2e 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database
[5f2d 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4]
[5f2f 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions
[5f30 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]
[5f31 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4]
[5f32 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3]
[5f33 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 57ms (state_validation=13ms block_and_pvtdata_commit=14ms state_commit=27ms) commitHash=[5c64075c0bfeb6c94e5ebc0c9f9fcc09379471aad663d5b0f84ccae8b7dc995e]
[5f34 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Purging private data from transient store for committed txids
[5f35 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x35, 0x30, 0x37, 0x37, 0x34, 0x65, 0x35, 0x35, 0x65, 0x33, 0x39, 0x37, 0x33, 0x35, 0x37, 0x30, 0x62, 0x30, 0x62, 0x31, 0x61, 0x34, 0x63, 0x64, 0x37, 0x63, 0x63, 0x61, 0x33, 0x65, 0x36, 0x61, 0x31, 0x31, 0x66, 0x33, 0x32, 0x65, 0x62, 0x63, 0x38, 0x64, 0x35, 0x38, 0x39, 0x36, 0x34, 0x66, 0x30, 0x35, 0x65, 0x32, 0x64, 0x66, 0x35, 0x35, 0x34, 0x31, 0x39, 0x33, 0x30, 0x35, 0x34, 0x39, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x35, 0x30, 0x37, 0x37, 0x34, 0x65, 0x35, 0x35, 0x65, 0x33, 0x39, 0x37, 0x33, 0x35, 0x37, 0x30, 0x62, 0x30, 0x62, 0x31, 0x61, 0x34, 0x63, 0x64, 0x37, 0x63, 0x63, 0x61, 0x33, 0x65, 0x36, 0x61, 0x31, 0x31, 0x66, 0x33, 0x32, 0x65, 0x62, 0x63, 0x38, 0x64, 0x35, 0x38, 0x39, 0x36, 0x34, 0x66, 0x30, 0x35, 0x65, 0x32, 0x64, 0x66, 0x35, 0x35, 0x34, 0x31, 0x39, 0x33, 0x30, 0x35, 0x34, 0x39, 0xff}]
[5f36 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Delivering block [3] for (0xc002f6bb80) for 172.18.0.9:57538
[5f37 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Get private data for block [3], filter=ledger.PvtNsCollFilter{"_lifecycle":ledger.PvtCollFilter{"_implicit_org_Org1MSP":true}}
[5f38 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Querying private data storage for write sets using startKey=[]byte{0x2, 0x1, 0x3, 0x0}, endKey=[]byte{0x2, 0x1, 0x4, 0x0}
[5f39 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x2, 0x1, 0x4, 0x0}]
[5f3a 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU mostRecentEntryBelow() - {lscc, _lifecycle~collection, 3}
[5f3b 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x73, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x7e, 0x63, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x1}]
[5f3c 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU Key no entry found. Returning nil
[5f3d 01-03 17:56:51.49 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [00c2a68c-2496-4253-958d-ea363d8682e7]
[5f3f 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [00c2a68c-2496-4253-958d-ea363d8682e7]
[5f40 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Found 1 for TxID 50774e55e3973570b0b1a4cd7cca3e6a11f32ebc8d58964f05e2df5541930549 , collection _implicit_org_Org1MSP for 172.18.0.5:57826
[5f41 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8b1b8bca-cc1a-4be2-b478-bc0e1d71ed1d]
[5f42 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8b1b8bca-cc1a-4be2-b478-bc0e1d71ed1d]
[5f43 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[5f44 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|
[5f45 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 c2 d3 e5 48 19 ce 37 7a 62 4b |0E.!.....H..7zbK|
00000010 14 78 88 aa b4 d5 cd 7b b7 3f 3d eb ba 5f 48 1a |.x.....{.?=.._H.|
00000020 7a 8b 8b a0 68 02 20 7b 0c 9b 22 ab 8f 93 99 9d |z...h. {..".....|
00000030 b6 ac d6 1d 30 24 3a 81 93 06 8c 9b d4 f4 ec ca |....0$:.........|
00000040 08 bc 28 82 93 74 df |..(..t.|
[5f46 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f47 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd38b0 gate 1578074211502531900 evaluation starts
[5f48 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd38b0 signed by 0 principal evaluation starts (used [false])
[5f49 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd38b0 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[5f4b 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd38b0 principal evaluation succeeds for identity 0
[5f4a 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]
[5f4c 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd38b0 gate 1578074211502531900 evaluation succeeds
[5f4d 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning 172.18.0.5:57826 1 elements
[5f3e 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408908FF491D1C09CF315...624D0F542C442AB5FE8C65C22A020804
[5f4e 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F79129D135E71DFDA51382F9B1D18635D8B74F4D602F0F768B07A8A86696FF15
[5f4f 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s)
[5f50 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[5f51 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:57538: read: connection reset by peer
[5f52 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[5f53 01-03 17:56:51.50 UTC] [%{longpkg}] %{callpath} -> DEBU Context canceled, aborting wait for next block
[5f54 01-03 17:56:51.51 UTC] [%{longpkg}] %{callpath} -> DEBU Closing Deliver stream
[5f55 01-03 17:56:51.51 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2020-01-03T17:57:19.355Z grpc.peer_address=172.18.0.9:57538 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1541526s
[5f56 01-03 17:56:51.51 UTC] [%{longpkg}] %{callpath} -> DEBU Came out of wait. maxAvailaBlockNumber=[3]
[5f57 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5f58 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f59 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5f5a 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5f5b 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 40 a6 5d e8 f0 d6 49 a5 a1 98 ed 86 b0 71 c2 |~@.]...I......q.|
00000010 ea a6 e7 2c 6b 69 57 7f 2b 75 c7 03 aa f7 0f f2 |...,kiW.+u......|
[5f5c 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 bf 53 b5 6c f2 8d dd 07 38 43 01 |0D. ..S.l....8C.|
00000010 7f 51 69 bc 00 b8 bc ce 51 68 3f 28 7c db 5b af |.Qi.....Qh?(|.[.|
00000020 34 6b 31 40 02 20 69 91 5a 4f 51 6a ed 12 f7 20 |4k1@. i.ZOQj... |
00000030 29 b9 2e a0 54 ca 5b c8 a3 68 4b 85 2f dd 8f 50 |)...T.[..hK./..P|
00000040 86 66 5d e0 7d 31 |.f].}1|
[5f5d 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5f5e 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd f1 ff e4 4e 18 ed bb c5 8f fc |0E.!.....N......|
00000010 df cf c5 4b 0f 90 2d 02 86 e2 a9 cd e1 86 6d 44 |...K..-.......mD|
00000020 2b d9 3e 8e 5b 02 20 0f 38 97 85 ec 31 54 95 65 |+.>.[. .8...1T.e|
00000030 a5 f6 82 6b b3 6b 1d 43 60 dd 3e a2 35 38 4f c9 |...k.k.C`.>.58O.|
00000040 4f 08 48 28 78 c8 31 |O.H(x.1|
[5f5f 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5f60 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[5f61 01-03 17:56:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75
[5f62 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75
[5f63 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[5f64 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f65 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f66 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f67 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f68 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f69 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f6a 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5f6b 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f6c 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5f6d 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5f6f 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f6e 01-03 17:56:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5f70 01-03 17:56:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f71 01-03 17:56:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5f72 01-03 17:56:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5f73 01-03 17:56:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f74 01-03 17:56:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5f75 01-03 17:56:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f76 01-03 17:56:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5f77 01-03 17:56:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5f78 01-03 17:56:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f79 01-03 17:56:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5f7a 01-03 17:56:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f7b 01-03 17:56:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:13884924778699903028 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5f7c 01-03 17:56:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13884924778699903028 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5f7d 01-03 17:56:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5f7e 01-03 17:56:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f7f 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5f80 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f81 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5f82 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[5f83 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 3a cf ee 7e fc 02 e3 07 1e 9c 37 2d d0 87 b8 |.:..~......7-...|
00000010 42 7c 00 88 2c de 5c f1 a3 f0 66 3c a0 2b 89 b8 |B|..,.\...f<.+..|
[5f84 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 9b 03 5d 39 50 c6 83 4c 25 41 |0E.!....]9P..L%A|
00000010 72 56 fc b4 6a 60 08 f9 4d 75 02 f0 9d 02 6d f4 |rV..j`..Mu....m.|
00000020 f2 18 98 88 7a 02 20 48 3f ac 79 5e e8 59 e2 43 |....z. H?.y^.Y.C|
00000030 4d 4e 2a 3f 11 7b 21 18 ec 76 ee 7f 2c f3 46 bd |MN*?.{!..v..,.F.|
00000040 13 84 b4 d2 4b 0f a6 |....K..|
[5f85 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5f86 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 62 1b f5 1e b1 94 6f 85 d6 57 45 |0D. {b.....o..WE|
00000010 25 68 46 b3 ce b0 ef 0f fd e5 2e 06 0a 6b f0 5a |%hF..........k.Z|
00000020 3b 59 10 51 02 20 1e 1c 7c 70 c0 e8 7b 3c 9b 7f |;Y.Q. ..|p..{<..|
00000030 1c 9a 6e ab d7 74 41 a0 c0 5f 2d 34 07 c1 22 53 |..n..tA.._-4.."S|
00000040 c3 ea b6 8d ce d0 |......|
[5f87 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5f88 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[5f89 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76
[5f8a 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76
[5f8b 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[5f8c 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f8d 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f8e 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f8f 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[5f90 01-03 17:56:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f91 01-03 17:56:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f92 01-03 17:56:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[5f93 01-03 17:56:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[5f94 01-03 17:56:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[5f95 01-03 17:56:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f96 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5f97 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5f98 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f99 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5f9a 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[5f9b 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f9c 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5f9d 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5f9e 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5f9f 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5fa0 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5fa1 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5fa2 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 73 ad 2b 32 7b ae fa 36 32 1e d1 50 f1 a3 3d |.s.+2{..62..P..=|
00000010 e2 8e 34 5a e7 98 7e 29 92 cd 6d d0 52 98 c1 21 |..4Z..~)..m.R..!|
[5fa3 01-03 17:56:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 5d 08 10 eb 17 e4 8d dd 5b 89 |0E.!..].......[.|
00000010 38 e5 45 48 31 82 ff 69 61 c1 c5 3c 85 ab f9 76 |8.EH1..ia..<...v|
00000020 09 d5 46 f3 cd 02 20 6a 18 f9 dd 01 5d ad 1e 00 |..F... j....]...|
00000030 bb f3 60 2b 35 8a 2e 34 7b 40 96 a4 7e 0c 48 d3 |..`+5..4{@..~.H.|
00000040 93 bb 41 be fc 2f 9b |..A../.|
[5fa4 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5fa5 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5ba80 gate 1578074212970578000 evaluation starts
[5fa6 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5ba80 signed by 0 principal evaluation starts (used [false])
[5fa7 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5ba80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5fa8 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5ba80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5fa9 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5ba80 principal evaluation fails
[5faa 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5ba80 gate 1578074212970578000 evaluation fails
[5fab 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5fac 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5fad 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5fae 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 73 ad 2b 32 7b ae fa 36 32 1e d1 50 f1 a3 3d |.s.+2{..62..P..=|
00000010 e2 8e 34 5a e7 98 7e 29 92 cd 6d d0 52 98 c1 21 |..4Z..~)..m.R..!|
[5faf 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 5d 08 10 eb 17 e4 8d dd 5b 89 |0E.!..].......[.|
00000010 38 e5 45 48 31 82 ff 69 61 c1 c5 3c 85 ab f9 76 |8.EH1..ia..<...v|
00000020 09 d5 46 f3 cd 02 20 6a 18 f9 dd 01 5d ad 1e 00 |..F... j....]...|
00000030 bb f3 60 2b 35 8a 2e 34 7b 40 96 a4 7e 0c 48 d3 |..`+5..4{@..~.H.|
00000040 93 bb 41 be fc 2f 9b |..A../.|
[5fb0 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5fb1 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d70380 gate 1578074212973862300 evaluation starts
[5fb2 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d70380 signed by 0 principal evaluation starts (used [false])
[5fb3 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d70380 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[5fb4 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d70380 principal evaluation succeeds for identity 0
[5fb5 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d70380 gate 1578074212973862300 evaluation succeeds
[5fb6 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5fb7 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5fb8 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5fb9 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5fba 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5fbb 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes]}
[5fbc 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73
[5fbd 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73
[5fbe 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5fbf 01-03 17:56:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fc0 01-03 17:56:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fc1 01-03 17:56:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fc2 01-03 17:56:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fc3 01-03 17:56:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fc4 01-03 17:56:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fc5 01-03 17:56:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fc6 01-03 17:56:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fc7 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fc8 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fc9 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5fca 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fcc 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5fcb 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5fce 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fcd 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5fcf 01-03 17:56:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fd0 01-03 17:56:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5fd1 01-03 17:56:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5fd2 01-03 17:56:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fd3 01-03 17:56:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5fd4 01-03 17:56:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fd5 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6498040724400605408 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5fd6 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:6498040724400605408 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5fd7 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6498040724400605408 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5fd8 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fd9 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fda 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fdb 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fdc 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fdd 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fde 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[5fdf 01-03 17:56:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fe0 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1259840165158250579 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5fe1 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:1259840165158250579 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5fe2 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1259840165158250579 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5fe3 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe4 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe5 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe6 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe7 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe8 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe9 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[5fea 01-03 17:56:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5feb 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5fec 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5fed 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fee 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5fef 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[5ff0 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ff1 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5ff2 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5ff3 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5ff4 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5ff5 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5ff6 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5ff7 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 15 49 40 a6 ac 44 b1 07 7a 74 f8 5b cb 21 f5 |..I@..D..zt.[.!.|
00000010 37 9a d7 da f5 d7 3f 8b 68 ad f1 70 b3 b7 13 7d |7.....?.h..p...}|
[5ff8 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 20 f0 97 fa f0 c8 d5 09 b7 b1 df |0D. 7 ..........|
00000010 b8 b5 58 b2 56 ea 09 cb 2f fe 7f 2f b2 c9 45 eb |..X.V.../../..E.|
00000020 f3 c8 94 12 02 20 45 58 35 8c f0 67 0d 2f 62 e0 |..... EX5..g./b.|
00000030 32 44 d7 39 e0 72 34 ae 4e f7 1d 04 ba d1 0c ad |2D.9.r4.N.......|
00000040 d1 52 4f 7d 7c fd |.RO}|.|
[5ff9 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5ffa 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2030 gate 1578074213079022000 evaluation starts
[5ffb 01-03 17:56:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2030 signed by 0 principal evaluation starts (used [false])
[5ffc 01-03 17:56:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2030 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[5ffd 01-03 17:56:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5ffe 01-03 17:56:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2030 principal evaluation fails
[5fff 01-03 17:56:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2030 gate 1578074213079022000 evaluation fails
[6000 01-03 17:56:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6001 01-03 17:56:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6002 01-03 17:56:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6003 01-03 17:56:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 15 49 40 a6 ac 44 b1 07 7a 74 f8 5b cb 21 f5 |..I@..D..zt.[.!.|
00000010 37 9a d7 da f5 d7 3f 8b 68 ad f1 70 b3 b7 13 7d |7.....?.h..p...}|
[6004 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 20 f0 97 fa f0 c8 d5 09 b7 b1 df |0D. 7 ..........|
00000010 b8 b5 58 b2 56 ea 09 cb 2f fe 7f 2f b2 c9 45 eb |..X.V.../../..E.|
00000020 f3 c8 94 12 02 20 45 58 35 8c f0 67 0d 2f 62 e0 |..... EX5..g./b.|
00000030 32 44 d7 39 e0 72 34 ae 4e f7 1d 04 ba d1 0c ad |2D.9.r4.N.......|
00000040 d1 52 4f 7d 7c fd |.RO}|.|
[6005 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6006 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2930 gate 1578074213093770500 evaluation starts
[6007 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2930 signed by 0 principal evaluation starts (used [false])
[6008 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2930 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6009 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2930 principal evaluation succeeds for identity 0
[600a 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2930 gate 1578074213093770500 evaluation succeeds
[600b 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[600c 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[600d 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[600e 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[600f 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[6010 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes]}
[6011 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75
[6012 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75
[6013 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[6014 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[6015 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6016 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6017 01-03 17:56:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6018 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6019 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[601a 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[601b 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[601c 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[601d 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[601e 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[601f 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6020 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6021 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6022 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6023 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6024 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6026 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6025 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[6027 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6028 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[6029 01-03 17:56:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[602a 01-03 17:56:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[602b 01-03 17:56:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[602c 01-03 17:56:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[602d 01-03 17:56:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[602e 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[602f 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6030 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6031 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6032 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6033 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6034 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6035 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6036 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6037 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6038 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6039 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[603a 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 dc 50 18 ea 33 25 b7 4a 92 ed 8c 02 7f 52 ac |..P..3%.J.....R.|
00000010 90 41 e1 48 97 06 29 77 e7 6e be 1f 01 7e 52 a4 |.A.H..)w.n...~R.|
[603b 01-03 17:56:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 e8 d8 dd ac 09 af 1c 67 e1 a0 d7 |0D. (.......g...|
00000010 b3 a6 e8 ce 2e 97 86 f2 91 26 62 a6 5a 21 14 3d |.........&b.Z!.=|
00000020 4d 95 51 b1 02 20 44 ec 0c f0 e5 23 5e 3a e6 f3 |M.Q.. D....#^:..|
00000030 a8 99 7c 57 24 c3 90 3a bb 86 8a 87 c3 4f 1f fb |..|W$..:.....O..|
00000040 32 e6 a9 80 d7 9c |2.....|
[603c 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[603d 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd5730 gate 1578074213141032600 evaluation starts
[603e 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd5730 signed by 0 principal evaluation starts (used [false])
[603f 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd5730 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6040 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd5730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6041 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd5730 principal evaluation fails
[6042 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd5730 gate 1578074213141032600 evaluation fails
[6043 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6044 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6045 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6046 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 dc 50 18 ea 33 25 b7 4a 92 ed 8c 02 7f 52 ac |..P..3%.J.....R.|
00000010 90 41 e1 48 97 06 29 77 e7 6e be 1f 01 7e 52 a4 |.A.H..)w.n...~R.|
[6047 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 e8 d8 dd ac 09 af 1c 67 e1 a0 d7 |0D. (.......g...|
00000010 b3 a6 e8 ce 2e 97 86 f2 91 26 62 a6 5a 21 14 3d |.........&b.Z!.=|
00000020 4d 95 51 b1 02 20 44 ec 0c f0 e5 23 5e 3a e6 f3 |M.Q.. D....#^:..|
00000030 a8 99 7c 57 24 c3 90 3a bb 86 8a 87 c3 4f 1f fb |..|W$..:.....O..|
00000040 32 e6 a9 80 d7 9c |2.....|
[6048 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6049 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dea030 gate 1578074213141608800 evaluation starts
[604a 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dea030 signed by 0 principal evaluation starts (used [false])
[604b 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dea030 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[604c 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dea030 principal evaluation succeeds for identity 0
[604d 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dea030 gate 1578074213141608800 evaluation succeeds
[604e 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[604f 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6050 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6051 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6052 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[6053 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes]}
[6054 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76
[6055 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76
[6056 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6057 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6058 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6059 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[605a 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[605b 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[605c 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[605d 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[605e 01-03 17:56:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[605f 01-03 17:56:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6060 01-03 17:56:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6061 01-03 17:56:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6062 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6063 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6064 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6065 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[6066 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6067 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6068 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6069 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[606a 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[606b 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[606c 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[606d 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 6f 17 a6 eb 60 dd a2 a3 08 80 80 ef e8 91 49 |.o...`.........I|
00000010 e3 9a 84 28 5e a7 86 aa 57 6a 69 22 7f ab b6 30 |...(^...Wji"...0|
[606e 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 41 30 b6 44 c2 ba f0 b8 89 b5 |0E.!..A0.D......|
00000010 e5 84 fc 1e 6f 8d 37 33 2a 89 4b b7 fb e7 78 fd |....o.73*.K...x.|
00000020 db 31 b5 c0 92 02 20 24 e3 fb d1 8f 0c ba 50 d4 |.1.... $......P.|
00000030 2a da 7a 17 10 5c dd 1d 0e 74 0b 0e 59 52 8a 52 |*.z..\...t..YR.R|
00000040 b6 97 37 5d c8 7d c4 |..7].}.|
[606f 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6070 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06860 gate 1578074213174951900 evaluation starts
[6071 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06860 signed by 0 principal evaluation starts (used [false])
[6072 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06860 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6073 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6074 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06860 principal evaluation fails
[6075 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e06860 gate 1578074213174951900 evaluation fails
[6076 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6077 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6078 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6079 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 6f 17 a6 eb 60 dd a2 a3 08 80 80 ef e8 91 49 |.o...`.........I|
00000010 e3 9a 84 28 5e a7 86 aa 57 6a 69 22 7f ab b6 30 |...(^...Wji"...0|
[607a 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 41 30 b6 44 c2 ba f0 b8 89 b5 |0E.!..A0.D......|
00000010 e5 84 fc 1e 6f 8d 37 33 2a 89 4b b7 fb e7 78 fd |....o.73*.K...x.|
00000020 db 31 b5 c0 92 02 20 24 e3 fb d1 8f 0c ba 50 d4 |.1.... $......P.|
00000030 2a da 7a 17 10 5c dd 1d 0e 74 0b 0e 59 52 8a 52 |*.z..\...t..YR.R|
00000040 b6 97 37 5d c8 7d c4 |..7].}.|
[607b 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[607c 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e07160 gate 1578074213177423900 evaluation starts
[607d 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e07160 signed by 0 principal evaluation starts (used [false])
[607e 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e07160 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[607f 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e07160 principal evaluation succeeds for identity 0
[6080 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e07160 gate 1578074213177423900 evaluation succeeds
[6081 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6082 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6083 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6084 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6085 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[6086 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes]}
[6087 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74
[6088 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74
[6089 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[608a 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[608b 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[608c 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[608d 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[608e 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[608f 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6090 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6091 01-03 17:56:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[6092 01-03 17:56:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6093 01-03 17:56:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6094 01-03 17:56:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6095 01-03 17:56:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6096 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151048
[6097 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1762D72CA39C83A9E5C5843A9D7505BC32C633F9379A690317FB8BECC9526173
[6098 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[6099 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[609a 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[609b 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[609c 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[609d 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[609e 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[609f 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60a0 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[60a1 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[60a2 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[60a3 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60a5 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[60a6 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60a4 01-03 17:56:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[60a7 01-03 17:56:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60a8 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[60a9 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16427603181933840949 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[60aa 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[60ab 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9906296575422892856 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[60ac 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[60ad 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16427603181933840949 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[60ae 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60af 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17423577979888469585 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[60b0 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9906296575422892856 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[60b2 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60b1 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17423577979888469585 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[60b3 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60b4 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9906296575422892856 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[60b5 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9906296575422892856 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[60b6 01-03 17:56:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60b7 01-03 17:56:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17423577979888469585 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[60b8 01-03 17:56:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17423577979888469585 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[60b9 01-03 17:56:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17423577979888469585 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[60ba 01-03 17:56:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60bb 01-03 17:56:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16427603181933840949 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[60bc 01-03 17:56:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16427603181933840949 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[60bd 01-03 17:56:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16427603181933840949 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[60be 01-03 17:56:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60bf 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151049
[60c0 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C8AE3819CF5FE1270E105AE3315DA316BA0EDF3ECC30B1D6E0F350233DD18488
[60c1 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[60c2 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[60c3 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60c4 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[60c5 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[60c6 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60c7 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[60c8 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[60c9 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60ca 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[60cb 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60cc 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[60cd 01-03 17:56:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60ce 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[60cf 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60d0 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[60d1 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[60d2 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 ae 38 19 cf 5f e1 27 0e 10 5a e3 31 5d a3 16 |..8.._.'..Z.1]..|
00000010 ba 0e df 3e cc 30 b1 d6 e0 f3 50 23 3d d1 84 88 |...>.0....P#=...|
[60d3 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a e1 5e 16 71 28 a2 31 fc 31 04 1d |0D. J.^.q(.1.1..|
00000010 54 7b 7e c2 7b d8 49 32 50 7e e9 fe aa b5 6c 8f |T{~.{.I2P~....l.|
00000020 02 24 6c ed 02 20 6d 64 c2 19 bc 63 b2 96 99 9a |.$l.. md...c....|
00000030 8c 9e d6 2e 9d d3 dd b2 a7 01 02 34 3f ed 18 75 |...........4?..u|
00000040 5d 02 54 62 3e 37 |].Tb>7|
[60d4 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[60d5 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 bb 5b e2 af 14 b6 27 f4 ff fe |0E.!...[....'...|
00000010 e0 a9 97 61 ea 21 4c 6f c1 05 c7 c3 03 40 50 34 |...a.!Lo.....@P4|
00000020 65 6c 11 00 f7 02 20 61 84 b1 10 a9 a4 66 a3 2e |el.... a.....f..|
00000030 f2 f0 48 4b 1a 31 5d 7a ad 2c cc dd 67 c7 3a e8 |..HK.1]z.,..g.:.|
00000040 04 07 8e 8e f7 de 5e |......^|
[60d6 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[60d7 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[60d8 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60d9 01-03 17:56:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60da 01-03 17:56:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[60db 01-03 17:56:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[60dc 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60dd 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[60de 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[60df 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60e0 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[60e1 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[60e2 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[60e3 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[60e4 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[60e5 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[60e6 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 6f 17 a6 eb 60 dd a2 a3 08 80 80 ef e8 91 49 |.o...`.........I|
00000010 e3 9a 84 28 5e a7 86 aa 57 6a 69 22 7f ab b6 30 |...(^...Wji"...0|
[60e7 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 41 30 b6 44 c2 ba f0 b8 89 b5 |0E.!..A0.D......|
00000010 e5 84 fc 1e 6f 8d 37 33 2a 89 4b b7 fb e7 78 fd |....o.73*.K...x.|
00000020 db 31 b5 c0 92 02 20 24 e3 fb d1 8f 0c ba 50 d4 |.1.... $......P.|
00000030 2a da 7a 17 10 5c dd 1d 0e 74 0b 0e 59 52 8a 52 |*.z..\...t..YR.R|
00000040 b6 97 37 5d c8 7d c4 |..7].}.|
[60e8 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[60e9 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9370 gate 1578074213362708700 evaluation starts
[60ea 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9370 signed by 0 principal evaluation starts (used [false])
[60eb 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9370 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[60ec 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[60ed 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9370 principal evaluation fails
[60ee 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9370 gate 1578074213362708700 evaluation fails
[60ef 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[60f0 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[60f1 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[60f2 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 6f 17 a6 eb 60 dd a2 a3 08 80 80 ef e8 91 49 |.o...`.........I|
00000010 e3 9a 84 28 5e a7 86 aa 57 6a 69 22 7f ab b6 30 |...(^...Wji"...0|
[60f3 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 41 30 b6 44 c2 ba f0 b8 89 b5 |0E.!..A0.D......|
00000010 e5 84 fc 1e 6f 8d 37 33 2a 89 4b b7 fb e7 78 fd |....o.73*.K...x.|
00000020 db 31 b5 c0 92 02 20 24 e3 fb d1 8f 0c ba 50 d4 |.1.... $......P.|
00000030 2a da 7a 17 10 5c dd 1d 0e 74 0b 0e 59 52 8a 52 |*.z..\...t..YR.R|
00000040 b6 97 37 5d c8 7d c4 |..7].}.|
[60f4 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[60f5 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9c70 gate 1578074213364987100 evaluation starts
[60f6 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9c70 signed by 0 principal evaluation starts (used [false])
[60f7 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9c70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[60f8 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9c70 principal evaluation succeeds for identity 0
[60f9 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d9c70 gate 1578074213364987100 evaluation succeeds
[60fa 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[60fb 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[60fc 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[60fd 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[60fe 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[60ff 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6100 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6101 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 ae 38 19 cf 5f e1 27 0e 10 5a e3 31 5d a3 16 |..8.._.'..Z.1]..|
00000010 ba 0e df 3e cc 30 b1 d6 e0 f3 50 23 3d d1 84 88 |...>.0....P#=...|
[6102 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a e1 5e 16 71 28 a2 31 fc 31 04 1d |0D. J.^.q(.1.1..|
00000010 54 7b 7e c2 7b d8 49 32 50 7e e9 fe aa b5 6c 8f |T{~.{.I2P~....l.|
00000020 02 24 6c ed 02 20 6d 64 c2 19 bc 63 b2 96 99 9a |.$l.. md...c....|
00000030 8c 9e d6 2e 9d d3 dd b2 a7 01 02 34 3f ed 18 75 |...........4?..u|
00000040 5d 02 54 62 3e 37 |].Tb>7|
[6103 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[6104 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[6105 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6106 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[6107 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 3a cf ee 7e fc 02 e3 07 1e 9c 37 2d d0 87 b8 |.:..~......7-...|
00000010 42 7c 00 88 2c de 5c f1 a3 f0 66 3c a0 2b 89 b8 |B|..,.\...f<.+..|
[6108 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 9b 03 5d 39 50 c6 83 4c 25 41 |0E.!....]9P..L%A|
00000010 72 56 fc b4 6a 60 08 f9 4d 75 02 f0 9d 02 6d f4 |rV..j`..Mu....m.|
00000020 f2 18 98 88 7a 02 20 48 3f ac 79 5e e8 59 e2 43 |....z. H?.y^.Y.C|
00000030 4d 4e 2a 3f 11 7b 21 18 ec 76 ee 7f 2c f3 46 bd |MN*?.{!..v..,.F.|
00000040 13 84 b4 d2 4b 0f a6 |....K..|
[6109 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[610a 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[610b 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[610c 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[610d 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[610e 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[610f 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6110 01-03 17:56:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6111 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6112 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6113 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6114 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6115 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6116 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6117 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 dc 50 18 ea 33 25 b7 4a 92 ed 8c 02 7f 52 ac |..P..3%.J.....R.|
00000010 90 41 e1 48 97 06 29 77 e7 6e be 1f 01 7e 52 a4 |.A.H..)w.n...~R.|
[6118 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 e8 d8 dd ac 09 af 1c 67 e1 a0 d7 |0D. (.......g...|
00000010 b3 a6 e8 ce 2e 97 86 f2 91 26 62 a6 5a 21 14 3d |.........&b.Z!.=|
00000020 4d 95 51 b1 02 20 44 ec 0c f0 e5 23 5e 3a e6 f3 |M.Q.. D....#^:..|
00000030 a8 99 7c 57 24 c3 90 3a bb 86 8a 87 c3 4f 1f fb |..|W$..:.....O..|
00000040 32 e6 a9 80 d7 9c |2.....|
[6119 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[611a 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004108f20 gate 1578074213372362700 evaluation starts
[611b 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004108f20 signed by 0 principal evaluation starts (used [false])
[611c 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004108f20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[611d 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004108f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[611e 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004108f20 principal evaluation fails
[611f 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004108f20 gate 1578074213372362700 evaluation fails
[6120 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6121 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6122 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6123 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 dc 50 18 ea 33 25 b7 4a 92 ed 8c 02 7f 52 ac |..P..3%.J.....R.|
00000010 90 41 e1 48 97 06 29 77 e7 6e be 1f 01 7e 52 a4 |.A.H..)w.n...~R.|
[6124 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 e8 d8 dd ac 09 af 1c 67 e1 a0 d7 |0D. (.......g...|
00000010 b3 a6 e8 ce 2e 97 86 f2 91 26 62 a6 5a 21 14 3d |.........&b.Z!.=|
00000020 4d 95 51 b1 02 20 44 ec 0c f0 e5 23 5e 3a e6 f3 |M.Q.. D....#^:..|
00000030 a8 99 7c 57 24 c3 90 3a bb 86 8a 87 c3 4f 1f fb |..|W$..:.....O..|
00000040 32 e6 a9 80 d7 9c |2.....|
[6125 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6126 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004109820 gate 1578074213374100800 evaluation starts
[6127 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004109820 signed by 0 principal evaluation starts (used [false])
[6128 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004109820 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6129 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004109820 principal evaluation succeeds for identity 0
[612a 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004109820 gate 1578074213374100800 evaluation succeeds
[612b 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[612c 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[612d 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[612e 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[612f 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[6130 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6131 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[6132 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 3a cf ee 7e fc 02 e3 07 1e 9c 37 2d d0 87 b8 |.:..~......7-...|
00000010 42 7c 00 88 2c de 5c f1 a3 f0 66 3c a0 2b 89 b8 |B|..,.\...f<.+..|
[6133 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 9b 03 5d 39 50 c6 83 4c 25 41 |0E.!....]9P..L%A|
00000010 72 56 fc b4 6a 60 08 f9 4d 75 02 f0 9d 02 6d f4 |rV..j`..Mu....m.|
00000020 f2 18 98 88 7a 02 20 48 3f ac 79 5e e8 59 e2 43 |....z. H?.y^.Y.C|
00000030 4d 4e 2a 3f 11 7b 21 18 ec 76 ee 7f 2c f3 46 bd |MN*?.{!..v..,.F.|
00000040 13 84 b4 d2 4b 0f a6 |....K..|
[6134 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6135 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6136 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6137 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 ae 38 19 cf 5f e1 27 0e 10 5a e3 31 5d a3 16 |..8.._.'..Z.1]..|
00000010 ba 0e df 3e cc 30 b1 d6 e0 f3 50 23 3d d1 84 88 |...>.0....P#=...|
[6138 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a e1 5e 16 71 28 a2 31 fc 31 04 1d |0D. J.^.q(.1.1..|
00000010 54 7b 7e c2 7b d8 49 32 50 7e e9 fe aa b5 6c 8f |T{~.{.I2P~....l.|
00000020 02 24 6c ed 02 20 6d 64 c2 19 bc 63 b2 96 99 9a |.$l.. md...c....|
00000030 8c 9e d6 2e 9d d3 dd b2 a7 01 02 34 3f ed 18 75 |...........4?..u|
00000040 5d 02 54 62 3e 37 |].Tb>7|
[6139 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[613a 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[613b 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[613c 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[613d 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[613e 01-03 17:56:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[613f 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6140 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6141 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6142 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6143 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[6144 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[6145 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[6146 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6147 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6148 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6149 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[614a 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[614b 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[614c 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[614d 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[614e 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[614f 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6150 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6151 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[6152 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[6153 01-03 17:56:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6154 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[6155 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[6156 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6158 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041421a0 gate 1578074213391276700 evaluation starts
[6157 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6159 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041421a0 signed by 0 principal evaluation starts (used [false])
[615a 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041421a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[615b 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041421a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[615c 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041421a0 principal evaluation fails
[615d 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041421a0 gate 1578074213391276700 evaluation fails
[615e 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[615f 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6160 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6161 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074211500776900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers
[6162 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6163 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[6164 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6165 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[6166 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6167 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074211500776900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes
[6168 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6169 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[616a 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142aa0 gate 1578074213391723200 evaluation starts
[616c 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074211500776900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes
[616d 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[616b 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142aa0 signed by 0 principal evaluation starts (used [false])
[616e 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142aa0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[616f 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074211500776900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes
[6170 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142aa0 principal evaluation succeeds for identity 0
[6171 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6172 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142aa0 gate 1578074213391723200 evaluation succeeds
[6173 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6174 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6175 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6176 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6177 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6178 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6179 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[617a 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[617b 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[617c 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[617d 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[617e 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[617f 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[6180 01-03 17:56:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[6181 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6182 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170500 gate 1578074213403615800 evaluation starts
[6183 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170500 signed by 0 principal evaluation starts (used [false])
[6184 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170500 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6185 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6186 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170500 principal evaluation fails
[6187 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170500 gate 1578074213403615800 evaluation fails
[6188 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6189 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[618a 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[618b 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[618c 01-03 17:56:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[618d 01-03 17:56:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[618e 01-03 17:56:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170e00 gate 1578074213410659500 evaluation starts
[618f 01-03 17:56:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170e00 signed by 0 principal evaluation starts (used [false])
[6190 01-03 17:56:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170e00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6191 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170e00 principal evaluation succeeds for identity 0
[6192 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170e00 gate 1578074213410659500 evaluation succeeds
[6193 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6194 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6195 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6196 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6197 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 97 1d 29 6c 59 a4 49 3e a2 6b cc bc d6 d6 e3 |...)lY.I>.k.....|
00000010 42 a4 40 42 36 1c a7 00 5f ef 9f 1d 2e 66 29 15 |B.@B6..._....f).|
[6198 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 fe 8e 06 07 40 e7 71 da f0 a8 08 |0D. x....@.q....|
00000010 49 ef 6b 4e 94 e2 88 d0 ea b6 20 0c 74 50 42 9d |I.kN...... .tPB.|
00000020 6c 98 b0 a1 02 20 54 76 39 b1 50 43 d2 5c 77 b3 |l.... Tv9.PC.\w.|
00000030 01 c1 b7 80 00 a4 1e 4b 50 0a 00 87 e4 00 f9 cc |.......KP.......|
00000040 f1 c2 13 39 da 55 |...9.U|
[6199 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[619a 01-03 17:56:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[619b 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[619c 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[619d 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[619e 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 97 1d 29 6c 59 a4 49 3e a2 6b cc bc d6 d6 e3 |...)lY.I>.k.....|
00000010 42 a4 40 42 36 1c a7 00 5f ef 9f 1d 2e 66 29 15 |B.@B6..._....f).|
[619f 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 fe 8e 06 07 40 e7 71 da f0 a8 08 |0D. x....@.q....|
00000010 49 ef 6b 4e 94 e2 88 d0 ea b6 20 0c 74 50 42 9d |I.kN...... .tPB.|
00000020 6c 98 b0 a1 02 20 54 76 39 b1 50 43 d2 5c 77 b3 |l.... Tv9.PC.\w.|
00000030 01 c1 b7 80 00 a4 1e 4b 50 0a 00 87 e4 00 f9 cc |.......KP.......|
00000040 f1 c2 13 39 da 55 |...9.U|
[61a0 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61a1 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e170 gate 1578074213436482000 evaluation starts
[61a2 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e170 signed by 0 principal evaluation starts (used [false])
[61a3 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e170 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[61a4 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e170 principal evaluation succeeds for identity 0
[61a5 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e170 gate 1578074213436482000 evaluation succeeds
[61a6 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[61a7 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[61a8 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[61a9 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[61aa 01-03 17:56:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[61ab 01-03 17:56:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[61ac 01-03 17:56:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61ad 01-03 17:56:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[61ae 01-03 17:56:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[61af 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61b0 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61b1 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[61b2 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[61b3 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[61b4 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[61b5 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[61b6 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[61b7 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[61b8 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[61b9 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61ba 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419c530 gate 1578074213455660700 evaluation starts
[61bb 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419c530 signed by 0 principal evaluation starts (used [false])
[61bc 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419c530 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[61bd 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419c530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[61be 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419c530 principal evaluation fails
[61bf 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419c530 gate 1578074213455660700 evaluation fails
[61c0 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[61c1 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[61c2 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[61c3 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 27 a7 b8 21 70 6a 15 94 0a ce fc 1f f3 a3 0b |.'..!pj.........|
00000010 96 c4 f8 00 77 15 87 c7 a1 04 6a db 15 78 34 4c |....w.....j..x4L|
[61c4 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 94 d5 c5 97 18 94 7e 85 e2 85 fe |0D. .......~....|
00000010 3a 40 b8 f5 2d 79 dd e0 32 1d 25 6b d7 45 06 af |:@..-y..2.%k.E..|
00000020 65 69 b4 a6 02 20 08 35 81 81 8b 88 fc 73 15 85 |ei... .5.....s..|
00000030 6a 00 25 ab 5d 3e 02 46 33 6b 01 19 a9 a9 b1 0f |j.%.]>.F3k......|
00000040 8d 01 20 7e e4 40 |.. ~.@|
[61c5 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61c6 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419ce30 gate 1578074213456120900 evaluation starts
[61c7 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419ce30 signed by 0 principal evaluation starts (used [false])
[61c8 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419ce30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[61c9 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419ce30 principal evaluation succeeds for identity 0
[61ca 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419ce30 gate 1578074213456120900 evaluation succeeds
[61cb 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[61cc 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[61cd 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[61ce 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[61cf 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[61d0 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[61d1 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61d2 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61d3 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[61d4 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[61d5 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[61d6 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[61d7 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[61d8 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[61d9 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 b3 8b de 90 7b e3 9a c0 90 cb 71 6b 9e 7c d2 |g....{.....qk.|.|
00000010 2c e6 36 f6 b4 ac 48 2d 96 2b cf f9 29 bd ca a4 |,.6...H-.+..)...|
[61da 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 f4 22 11 82 b0 8b f8 ed 96 8f e5 |0D. 8.".........|
00000010 3f dc dd 57 40 59 1d de 2c 8f 84 6a 65 b1 7c be |?..W@Y..,..je.|.|
00000020 a0 02 fe 78 02 20 03 b9 76 92 51 4e 6f 8f b6 26 |...x. ..v.QNo..&|
00000030 22 71 cb 90 22 0c 46 4e 20 4b 5e d5 2b 37 53 a9 |"q..".FN K^.+7S.|
00000040 22 f2 25 1a e1 f0 |".%...|
[61db 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61dc 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2f40 gate 1578074213457614300 evaluation starts
[61dd 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2f40 signed by 0 principal evaluation starts (used [false])
[61de 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2f40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[61df 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[61e0 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2f40 principal evaluation fails
[61e1 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2f40 gate 1578074213457614300 evaluation fails
[61e2 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[61e3 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[61e4 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[61e5 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 b3 8b de 90 7b e3 9a c0 90 cb 71 6b 9e 7c d2 |g....{.....qk.|.|
00000010 2c e6 36 f6 b4 ac 48 2d 96 2b cf f9 29 bd ca a4 |,.6...H-.+..)...|
[61e6 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 f4 22 11 82 b0 8b f8 ed 96 8f e5 |0D. 8.".........|
00000010 3f dc dd 57 40 59 1d de 2c 8f 84 6a 65 b1 7c be |?..W@Y..,..je.|.|
00000020 a0 02 fe 78 02 20 03 b9 76 92 51 4e 6f 8f b6 26 |...x. ..v.QNo..&|
00000030 22 71 cb 90 22 0c 46 4e 20 4b 5e d5 2b 37 53 a9 |"q..".FN K^.+7S.|
00000040 22 f2 25 1a e1 f0 |".%...|
[61e7 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61e8 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3840 gate 1578074213458068300 evaluation starts
[61e9 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3840 signed by 0 principal evaluation starts (used [false])
[61ea 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3840 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[61eb 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3840 principal evaluation succeeds for identity 0
[61ec 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3840 gate 1578074213458068300 evaluation succeeds
[61ed 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[61ee 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[61ef 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[61f0 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[61f1 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61f2 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[61f3 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[61f4 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[61f5 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[61f6 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[61f7 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 b3 8b de 90 7b e3 9a c0 90 cb 71 6b 9e 7c d2 |g....{.....qk.|.|
00000010 2c e6 36 f6 b4 ac 48 2d 96 2b cf f9 29 bd ca a4 |,.6...H-.+..)...|
[61f8 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 f4 22 11 82 b0 8b f8 ed 96 8f e5 |0D. 8.".........|
00000010 3f dc dd 57 40 59 1d de 2c 8f 84 6a 65 b1 7c be |?..W@Y..,..je.|.|
00000020 a0 02 fe 78 02 20 03 b9 76 92 51 4e 6f 8f b6 26 |...x. ..v.QNo..&|
00000030 22 71 cb 90 22 0c 46 4e 20 4b 5e d5 2b 37 53 a9 |"q..".FN K^.+7S.|
00000040 22 f2 25 1a e1 f0 |".%...|
[61f9 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61fa 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c65d0 gate 1578074213458659700 evaluation starts
[61fb 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c65d0 signed by 0 principal evaluation starts (used [false])
[61fc 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c65d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[61fd 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c65d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[61fe 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c65d0 principal evaluation fails
[61ff 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c65d0 gate 1578074213458659700 evaluation fails
[6200 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6201 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6202 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6203 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 b3 8b de 90 7b e3 9a c0 90 cb 71 6b 9e 7c d2 |g....{.....qk.|.|
00000010 2c e6 36 f6 b4 ac 48 2d 96 2b cf f9 29 bd ca a4 |,.6...H-.+..)...|
[6204 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 f4 22 11 82 b0 8b f8 ed 96 8f e5 |0D. 8.".........|
00000010 3f dc dd 57 40 59 1d de 2c 8f 84 6a 65 b1 7c be |?..W@Y..,..je.|.|
00000020 a0 02 fe 78 02 20 03 b9 76 92 51 4e 6f 8f b6 26 |...x. ..v.QNo..&|
00000030 22 71 cb 90 22 0c 46 4e 20 4b 5e d5 2b 37 53 a9 |"q..".FN K^.+7S.|
00000040 22 f2 25 1a e1 f0 |".%...|
[6205 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6206 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6ed0 gate 1578074213459058900 evaluation starts
[6207 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6ed0 signed by 0 principal evaluation starts (used [false])
[6208 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6ed0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6209 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6ed0 principal evaluation succeeds for identity 0
[620a 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6ed0 gate 1578074213459058900 evaluation succeeds
[620b 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[620c 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[620d 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[620e 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[620f 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6210 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes
[6211 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6212 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 3a 6f e4 7a 3a fc 1f b3 5c 2a 8a 69 6b d2 23 |":o.z:...\*.ik.#|
00000010 ba 0d fd 59 a7 e9 a4 15 d1 c1 1d be d1 4f 92 fe |...Y.........O..|
[6213 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 1b 67 27 c4 e3 dd ff 35 13 1d |0E.!...g'....5..|
00000010 ba 53 47 1e 51 4e 9f 72 e5 94 e6 51 bb 6f 31 d8 |.SG.QN.r...Q.o1.|
00000020 11 0c 0d e8 c3 02 20 0f 4e 68 11 e7 33 c5 d3 36 |...... .Nh..3..6|
00000030 2a b9 7f e0 38 84 56 4c 2d 5f ec 86 ba d2 e1 2b |*...8.VL-_.....+|
00000040 77 27 b2 5a 72 fd 0d |w'.Zr..|
[6214 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 b2 58 59 4c c9 ee ed 5e 34 71 fc 3c ec db e7 |..XYL...^4q.<...|
00000010 76 fd 6a b1 28 7e 9d c4 65 05 6e a6 98 1a 12 52 |v.j.(~..e.n....R|
[6215 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1b 3a 6e 96 b1 52 5d cb b2 93 f9 |0D. 9.:n..R]....|
00000010 34 29 1b 33 f9 5e 14 39 d6 8e 81 06 95 8e e9 49 |4).3.^.9.......I|
00000020 0f 70 24 cc 02 20 3a 68 2c 4c b4 87 fc 7c fd de |.p$.. :h,L...|..|
00000030 4f 31 e6 1a 2c b9 2c 58 c0 6f c1 c3 99 76 94 ce |O1..,.,X.o...v..|
00000040 b9 15 87 bd 4a 2b |....J+|
[6216 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6217 01-03 17:56:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6218 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6219 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[621a 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[621b 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[621c 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[621d 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[621e 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[621f 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[6220 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6221 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d7940 gate 1578074213460424700 evaluation starts
[6222 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d7940 signed by 0 principal evaluation starts (used [false])
[6223 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d7940 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6224 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d7940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6225 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d7940 principal evaluation fails
[6226 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d7940 gate 1578074213460424700 evaluation fails
[6227 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6228 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6229 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[622a 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 9b 5f 8e 19 cf 29 22 b4 ab e5 40 7e bc 0b |.t._...)"...@~..|
00000010 bb b1 f6 fd 1e 4b c7 3f 12 8b f5 df d1 4d 41 c4 |.....K.?.....MA.|
[622b 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 34 cb 52 d3 f0 02 24 66 e4 7a 27 |0D. .4.R...$f.z'|
00000010 4b a6 6b d9 a6 b6 14 6d a4 47 f8 43 cf 62 17 31 |K.k....m.G.C.b.1|
00000020 c7 e8 d6 a4 02 20 53 10 da 58 c5 3c 88 60 db c1 |..... S..X.<.`..|
00000030 eb fd f7 59 8f 1a b6 a0 9a ff 68 49 18 d3 4b 77 |...Y......hI..Kw|
00000040 df be 69 24 a5 1c |..i$..|
[622c 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[622d 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f4240 gate 1578074213460835300 evaluation starts
[622e 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f4240 signed by 0 principal evaluation starts (used [false])
[622f 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f4240 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6230 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f4240 principal evaluation succeeds for identity 0
[6231 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f4240 gate 1578074213460835300 evaluation succeeds
[6232 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6233 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6234 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6235 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6236 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6237 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6238 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6239 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[623a 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[623b 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[623c 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[623d 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[623e 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[623f 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[6240 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6241 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5ca0 gate 1578074213461630200 evaluation starts
[6242 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5ca0 signed by 0 principal evaluation starts (used [false])
[6243 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5ca0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6244 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6245 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5ca0 principal evaluation fails
[6246 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f5ca0 gate 1578074213461630200 evaluation fails
[6247 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6248 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6249 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[624a 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[624b 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[624c 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[624d 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420c5a0 gate 1578074213464477300 evaluation starts
[624e 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420c5a0 signed by 0 principal evaluation starts (used [false])
[624f 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420c5a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6250 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420c5a0 principal evaluation succeeds for identity 0
[6251 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420c5a0 gate 1578074213464477300 evaluation succeeds
[6252 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6253 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6254 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6255 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6256 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6257 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6258 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6259 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[625a 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[625b 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[625c 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[625d 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[625e 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[625f 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420d330 gate 1578074213467320300 evaluation starts
[6260 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420d330 signed by 0 principal evaluation starts (used [false])
[6261 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420d330 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6262 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420d330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6263 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420d330 principal evaluation fails
[6264 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420d330 gate 1578074213467320300 evaluation fails
[6265 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6266 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6267 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6268 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[6269 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[626a 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[626b 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420dc30 gate 1578074213469691100 evaluation starts
[626c 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420dc30 signed by 0 principal evaluation starts (used [false])
[626d 01-03 17:56:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420dc30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[626e 01-03 17:56:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420dc30 principal evaluation succeeds for identity 0
[626f 01-03 17:56:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00420dc30 gate 1578074213469691100 evaluation succeeds
[6270 01-03 17:56:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6271 01-03 17:56:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6272 01-03 17:56:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6273 01-03 17:56:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6274 01-03 17:56:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6275 01-03 17:56:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6276 01-03 17:56:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6277 01-03 17:56:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[6278 01-03 17:56:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6279 01-03 17:56:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[627a 01-03 17:56:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4629065780115786746 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[627b 01-03 17:56:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4629065780115786746 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[627c 01-03 17:56:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[627d 01-03 17:56:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4629065780115786746 , Msg_type: BLOCK_MSG, digests: [1 3 2], Envelope: 42 bytes, Signature: 0 bytes
[627e 01-03 17:56:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4629065780115786746 , Msg_type: BLOCK_MSG, digests: [1 3 2], Envelope: 42 bytes, Signature: 0 bytes
[627f 01-03 17:56:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6280 01-03 17:56:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[6281 01-03 17:56:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6282 01-03 17:56:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6283 01-03 17:56:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6284 01-03 17:56:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074211578774500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[6285 01-03 17:56:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 97 1d 29 6c 59 a4 49 3e a2 6b cc bc d6 d6 e3 |...)lY.I>.k.....|
00000010 42 a4 40 42 36 1c a7 00 5f ef 9f 1d 2e 66 29 15 |B.@B6..._....f).|
[6286 01-03 17:56:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 fe 8e 06 07 40 e7 71 da f0 a8 08 |0D. x....@.q....|
00000010 49 ef 6b 4e 94 e2 88 d0 ea b6 20 0c 74 50 42 9d |I.kN...... .tPB.|
00000020 6c 98 b0 a1 02 20 54 76 39 b1 50 43 d2 5c 77 b3 |l.... Tv9.PC.\w.|
00000030 01 c1 b7 80 00 a4 1e 4b 50 0a 00 87 e4 00 f9 cc |.......KP.......|
00000040 f1 c2 13 39 da 55 |...9.U|
[6287 01-03 17:56:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6288 01-03 17:56:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074211578774500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[6289 01-03 17:56:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074211578774500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[628a 01-03 17:56:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 97 1d 29 6c 59 a4 49 3e a2 6b cc bc d6 d6 e3 |...)lY.I>.k.....|
00000010 42 a4 40 42 36 1c a7 00 5f ef 9f 1d 2e 66 29 15 |B.@B6..._....f).|
[628b 01-03 17:56:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 fe 8e 06 07 40 e7 71 da f0 a8 08 |0D. x....@.q....|
00000010 49 ef 6b 4e 94 e2 88 d0 ea b6 20 0c 74 50 42 9d |I.kN...... .tPB.|
00000020 6c 98 b0 a1 02 20 54 76 39 b1 50 43 d2 5c 77 b3 |l.... Tv9.PC.\w.|
00000030 01 c1 b7 80 00 a4 1e 4b 50 0a 00 87 e4 00 f9 cc |.......KP.......|
00000040 f1 c2 13 39 da 55 |...9.U|
[628c 01-03 17:56:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[628d 01-03 17:56:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[628e 01-03 17:56:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074211578774500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[628f 01-03 17:56:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074211578774500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[6290 01-03 17:56:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 97 1d 29 6c 59 a4 49 3e a2 6b cc bc d6 d6 e3 |...)lY.I>.k.....|
00000010 42 a4 40 42 36 1c a7 00 5f ef 9f 1d 2e 66 29 15 |B.@B6..._....f).|
[6291 01-03 17:56:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 fe 8e 06 07 40 e7 71 da f0 a8 08 |0D. x....@.q....|
00000010 49 ef 6b 4e 94 e2 88 d0 ea b6 20 0c 74 50 42 9d |I.kN...... .tPB.|
00000020 6c 98 b0 a1 02 20 54 76 39 b1 50 43 d2 5c 77 b3 |l.... Tv9.PC.\w.|
00000030 01 c1 b7 80 00 a4 1e 4b 50 0a 00 87 e4 00 f9 cc |.......KP.......|
00000040 f1 c2 13 39 da 55 |...9.U|
[6292 01-03 17:56:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6293 01-03 17:56:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6294 01-03 17:56:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14901832146142601658 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[6295 01-03 17:56:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14901832146142601658 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[6296 01-03 17:56:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[6297 01-03 17:56:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6298 01-03 17:56:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[6299 01-03 17:56:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[629a 01-03 17:56:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[629b 01-03 17:56:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[629c 01-03 17:56:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[629d 01-03 17:56:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[629e 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[629f 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[62a0 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[62a1 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[62a2 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[62a3 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 11 ea e3 df 98 66 1a 2b b3 34 6a c1 58 94 2e |\.....f.+.4j.X..|
00000010 28 7e a3 5c d9 ec 9b 3f a8 88 c1 63 30 a2 fa f0 |(~.\...?...c0...|
[62a4 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e a2 79 50 1d 0a 2d 4b be 28 8d 70 |0D. ..yP..-K.(.p|
00000010 7a 60 d0 26 0a 19 2b 7f 9d e6 81 62 a8 51 89 ac |z`.&..+....b.Q..|
00000020 15 b1 0e e1 02 20 7d ba d0 f6 96 9e 9b ed bc 61 |..... }........a|
00000030 2a b1 15 d0 29 32 1f a9 ff 72 98 5c 7d bd 1f bc |*...)2...r.\}...|
00000040 d2 ae 5a 4a 4a a5 |..ZJJ.|
[62a5 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[62a6 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155350 gate 1578074214139358100 evaluation starts
[62a7 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155350 signed by 0 principal evaluation starts (used [false])
[62a8 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155350 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[62a9 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155350 principal evaluation succeeds for identity 0
[62aa 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155350 gate 1578074214139358100 evaluation succeeds
[62ab 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[62ac 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[62ad 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[62ae 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[62af 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [4] channel=businesschannel
[62b0 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4]
[62b1 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[62b2 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [4] channel=businesschannel
[62b3 01-03 17:56:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4755 bytes, seq: 4}, Envelope: 4785 bytes, Signature: 0 bytes to the block puller
[62b4 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4
[62b5 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]
[62b6 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger
[62b7 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer
[62b8 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4]
[62b9 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4]
[62ba 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[62bb 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0035df2c0 env 0xc00425e190 txn 0
[62bc 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00425e190
[62bd 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\344\200\276\360\005\020\340\247\332\032\"\017businesschannel*@eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030}-\n\337\026Mc\241\357\204\225!\250\204d#\342x\005kC\010'\371"
[62be 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[62bf 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[62c0 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[62c1 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c2 01-03 17:56:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[62c3 01-03 17:56:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c4 01-03 17:56:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c5 01-03 17:56:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c6 01-03 17:56:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c7 01-03 17:56:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4755 bytes, seq: 4}, Envelope: 4785 bytes, Signature: 0 bytes to 1 peers
[62c8 01-03 17:56:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c9 01-03 17:56:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62ca 01-03 17:56:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4755 bytes, seq: 4}, Envelope: 4785 bytes, Signature: 0 bytes
[62cb 01-03 17:56:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62cc 01-03 17:56:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[62cd 01-03 17:56:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[62ce 01-03 17:56:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[62cf 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[62d0 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 28 56 9a 35 4a 33 b8 12 75 5b 3f 67 15 6d 33 |q(V.5J3..u[?g.m3|
00000010 cf 16 83 9c 4d a3 c2 48 8c 90 7e 0d a6 f2 8b 3a |....M..H..~....:|
[62d1 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 b7 a6 0c e3 45 83 d4 73 a9 77 64 |0D. w....E..s.wd|
00000010 14 1c 04 ed 57 38 9d b1 41 71 88 19 c5 2e 95 76 |....W8..Aq.....v|
00000020 94 ef 8d a0 02 20 09 46 5c e0 76 e4 88 d1 ad d8 |..... .F\.v.....|
00000030 eb 52 77 72 0e 8e 42 bc fe b2 93 8b c2 84 8b c2 |.Rwr..B.........|
00000040 69 e2 3d 47 5f 30 |i.=G_0|
[62d2 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[62d3 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002b15000, header channel_header:"\010\003\032\013\010\344\200\276\360\005\020\340\247\332\032\"\017businesschannel*@eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030}-\n\337\026Mc\241\357\204\225!\250\204d#\342x\005kC\010'\371"
[62d4 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[62d5 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[62d6 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[62d7 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[62d8 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138]
[62d9 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x65, 0x66, 0x33, 0x62, 0x30, 0x31, 0x62, 0x30, 0x66, 0x36, 0x63, 0x64, 0x39, 0x66, 0x31, 0x32, 0x38, 0x61, 0x64, 0x66, 0x66, 0x37, 0x34, 0x63, 0x30, 0x31, 0x36, 0x66, 0x64, 0x34, 0x31, 0x38, 0x62, 0x62, 0x39, 0x66, 0x31, 0x66, 0x30, 0x39, 0x62, 0x31, 0x30, 0x36, 0x66, 0x39, 0x36, 0x61, 0x38, 0x63, 0x30, 0x64, 0x37, 0x30, 0x39, 0x30, 0x63, 0x37, 0x33, 0x32, 0x31, 0x33, 0x38}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x65, 0x66, 0x33, 0x62, 0x30, 0x31, 0x62, 0x30, 0x66, 0x36, 0x63, 0x64, 0x39, 0x66, 0x31, 0x32, 0x38, 0x61, 0x64, 0x66, 0x66, 0x37, 0x34, 0x63, 0x30, 0x31, 0x36, 0x66, 0x64, 0x34, 0x31, 0x38, 0x62, 0x62, 0x39, 0x66, 0x31, 0x66, 0x30, 0x39, 0x62, 0x31, 0x30, 0x36, 0x66, 0x39, 0x36, 0x61, 0x38, 0x63, 0x30, 0x64, 0x37, 0x30, 0x39, 0x30, 0x63, 0x37, 0x33, 0x32, 0x31, 0x33, 0x38, 0xff}]
[62da 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[62db 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc004274000
[62dc 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2b544b0c-3958-4452-8431-707135bac9a8]
[62dd 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2b544b0c-3958-4452-8431-707135bac9a8]
[62de 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin
[62df 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [c6d31553-18f4-415e-a5d2-7819ed7179e3]
[62e0 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[62e1 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[62e2 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c6d31553-18f4-415e-a5d2-7819ed7179e3]
[62e3 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [26e37ee5-0b13-41bd-9118-6d63eefb6665]
[62e4 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [26e37ee5-0b13-41bd-9118-6d63eefb6665]
[62e5 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==
[62e6 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe c5 dd 25 28 bc 83 c4 96 b0 c3 dc c3 60 5e 9f |...%(........`^.|
00000010 35 9f bb 8e b0 42 6a 35 81 c2 5b f8 84 2c e2 3d |5....Bj5..[..,.=|
[62e7 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 59 6c 19 4c 01 99 f4 54 89 41 |0D. g.Yl.L...T.A|
00000010 51 fc b5 65 7b 38 84 49 24 57 e2 91 26 ee 94 d9 |Q..e{8.I$W..&...|
00000020 46 38 d0 74 02 20 52 1e 37 3c ab ec 26 89 f5 b1 |F8.t. R.7<..&...|
00000030 69 f1 7f 85 15 f5 4e 97 55 5d 6a fa 09 11 64 66 |i.....N.U]j...df|
00000040 7e 83 c6 2d 09 6c |~..-.l|
[62e8 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[62e9 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296970 gate 1578074214173396000 evaluation starts
[62ea 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296970 signed by 0 principal evaluation starts (used [false])
[62eb 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296970 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[62ec 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296970 principal evaluation succeeds for identity 0
[62ed 01-03 17:56:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296970 gate 1578074214173396000 evaluation succeeds
[62ee 01-03 17:56:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement
[62ef 01-03 17:56:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement
[62f0 01-03 17:56:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a87d2c5d-07e7-402d-8bfc-30a28e022a19]
[62f1 01-03 17:56:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[62f2 01-03 17:56:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > ]
[62f3 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a87d2c5d-07e7-402d-8bfc-30a28e022a19]
[62f4 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5130b366-705c-4006-80cb-0d4eb1e97b9d]
[62f5 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[62f6 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[62f7 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5130b366-705c-4006-80cb-0d4eb1e97b9d]
[62f8 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [baa189c0-b2d9-43c3-aced-ab0aa3aac11b]
[62f9 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[62fa 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[62fb 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [baa189c0-b2d9-43c3-aced-ab0aa3aac11b]
[62fc 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4806ed39-e063-4b9b-9c2f-f69b5d44429a]
[62fd 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[62fe 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[62ff 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4806ed39-e063-4b9b-9c2f-f69b5d44429a]
[6300 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [03872efa-118f-4e2d-a16b-70e8a00b39ed]
[6301 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[6302 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[6303 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [03872efa-118f-4e2d-a16b-70e8a00b39ed]
[6304 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: _lifecycle, tx 0 validation results is: <nil>
[6305 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138 appears to be valid
[6306 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc004274000
[6307 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0035df2c0 env 0xc00425e190 txn 0
[6308 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[6309 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 50ms
[630a 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [94669074-d25f-4741-93de-c6b6405bd901]
[630b 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [94669074-d25f-4741-93de-c6b6405bd901]
[630c 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[630d 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... |
00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|
[630e 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 df 1b c5 8d f0 50 72 47 39 7a 65 |0D. Y.....PrG9ze|
00000010 6a 4e 5c f8 fd b2 0b ae 36 ca ec 4e 6f 6c e3 c0 |jN\.....6..Nol..|
00000020 8e 39 4c 40 02 20 76 97 e3 3e ed 0a ab 0d 76 e4 |.9L@. v..>....v.|
00000030 09 21 48 67 03 87 b7 a5 0e ad d3 51 4d 48 61 08 |.!Hg.......QMHa.|
00000040 3d 8a 34 dc 71 98 |=.4.q.|
[630f 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6310 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2920 gate 1578074214194148500 evaluation starts
[6311 01-03 17:56:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2920 signed by 0 principal evaluation starts (used [false])
[6312 01-03 17:56:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2920 processing identity 0 - &{Org1MSP 72d14a8ffb3355b2cd5ce4f5575706e3d93f82ccf34f87f37b6ede3c9fbcf9a5}
[6313 01-03 17:56:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[6314 01-03 17:56:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2920 principal evaluation fails
[6315 01-03 17:56:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2920 gate 1578074214194148500 evaluation fails
[6316 01-03 17:56:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Peer is not eligible for collection: chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc0042b1140), memberOrgs:[]string{"Org2MSP"}, conf:peer.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*peer.CollectionPolicyConfig)(0xc0042a7aa0), RequiredPeerCount:0, MaximumPeerCount:0, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, EndorsementPolicy:(*peer.ApplicationPolicy)(nil), XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping. channel=businesschannel
[6317 01-03 17:56:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[631a 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[6318 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074211575682500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[6319 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074211575682500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[631b 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [4] channel=businesschannel
[631d 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4]
[631e 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[631c 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074211575682500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[631f 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[6320 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[6321 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6323 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6324 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6325 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6326 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6327 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6328 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6329 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[632a 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[632b 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[632c 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ec360 gate 1578074214226883800 evaluation starts
[632d 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ec360 signed by 0 principal evaluation starts (used [false])
[632e 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ec360 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[632f 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ec360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6330 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ec360 principal evaluation fails
[6331 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ec360 gate 1578074214226883800 evaluation fails
[6332 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6333 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6334 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6322 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4]
[6335 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[6336 01-03 17:56:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[6337 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[6338 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6339 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[633a 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[633b 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[633c 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'
[633d 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[633e 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[633f 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6340 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138] marked as valid by state validator. ContainsPostOrderWrites [false]
[6341 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0037a9280), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0037a9340), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0037a9200), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0037a9240), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4<k\xbe\x06\f\xfcG4\x15\xdc\xc8\x17\xa4ψ\xe6\x8a\xc9.ܿ"}:(*internal.keyOps)(0xc0037a9300), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc0037a92c0)}
[6342 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[6343 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[6344 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[6345 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408908FF491D1C09CF315...624D0F542C442AB5FE8C65C22A020804
[6346 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 002060D1789376F1AC310E1FBD05C8B82E964C81088D6A853BB321965BFF6A8B
[6347 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[6348 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0xc00031a4e0 0xc0003382e0 0xc000334b20 0xc0000100d0}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[<5B>;<3B>A<EFBFBD><41><EFBFBD><EFBFBD>TU FEX<45><58>ղ<><D5B2><EFBFBD>I‹<49>\<5C>.(<28>:%!s(*lifecycle.LocalChaincode=&{0xc002ec6a00 map[]})] %!s(*lifecycle.EventBroker=&{0xc0003382e0 0xc0002d7ee0 0xc000334b20 0xc0002df740 {0 0} map[]}) %!s(*lifecycle.MetadataManager=&{{0 0} [0x15f73f0] map[businesschannel:[]] map[businesschannel:[]]}) %!s(*lifecycle.ChaincodeCustodian=&{0xc000438640 {0 0} [] false})}
[634a 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[634b 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ecc60 gate 1578074214238364400 evaluation starts
[6349 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}
[634c 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]
[634d 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88})}
[634f 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 181 188 186 246 204 200 82 24 163 18 115 169 243 165 172 145 130 171 21 5 18 41 65 247 176 146 208 82 173 105 156 166 2 32 11 83 173 30 184 150 36 95 0 210 3 48 155 20 156 229 137 3 95 230 99 168 92 201 143 203 217 20 86 75 192 120]} 0x15f7150}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc000267380 0xc000123a40 {{0 0} 0 0 0 0} {false}})]}
[6350 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88}) %!s(*confighistory.dbProvider=&{0xc00087ac00})}
[6351 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4]
[6352 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage
[6353 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store
[634e 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ecc60 signed by 0 principal evaluation starts (used [false])
[6354 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3147ee42-8495-4b83-8335-a2a72e65ad7c]
[6355 01-03 17:56:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ecc60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6356 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3147ee42-8495-4b83-8335-a2a72e65ad7c]
[6358 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4]
[6357 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ecc60 principal evaluation succeeds for identity 0
[6359 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ecc60 gate 1578074214238364400 evaluation succeeds
[635a 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[635b 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[635c 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[635e 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[635d 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4]
[635f 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6360 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6361 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074211575682500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes
[6362 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6363 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6364 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6365 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6366 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6367 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6368 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6369 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[636a 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[636b 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[636c 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305980 gate 1578074214248758200 evaluation starts
[636d 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305980 signed by 0 principal evaluation starts (used [false])
[636e 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305980 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[636f 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6370 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305980 principal evaluation fails
[6371 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305980 gate 1578074214248758200 evaluation fails
[6372 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6373 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6374 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6375 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[6376 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[6377 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6378 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a280 gate 1578074214249154800 evaluation starts
[6379 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a280 signed by 0 principal evaluation starts (used [false])
[637a 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a280 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[637b 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a280 principal evaluation succeeds for identity 0
[637c 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a280 gate 1578074214249154800 evaluation succeeds
[637d 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[637e 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[637f 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6380 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6381 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6382 01-03 17:56:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6383 01-03 17:56:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x89, 0xfc, 0x28, 0x48, 0x95, 0x6e, 0x9f, 0x9d, 0x9d, 0x1f, 0x54, 0xb5, 0x5b, 0x36, 0x5c, 0x9c, 0x78, 0x1, 0x38, 0x66, 0x33, 0xcf, 0xab, 0x2c, 0x8b, 0x36, 0xcf, 0x7, 0xa2, 0xb0, 0xb8, 0x2d} txOffsets=
txId=eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138 locPointer=offset=70, bytesLength=3746
]
[6384 01-03 17:56:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76270, bytesLength=3746] for tx ID: [eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138] to txid-index
[6385 01-03 17:56:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=76270, bytesLength=3746] for tx number:[0] ID: [eef3b01b0f6cd9f128adff74c016fd418bb9f1f09b106f96a8c0d7090c732138] to blockNumTranNum index
[6386 01-03 17:56:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80977], isChainEmpty=[false], lastBlockNumber=[4]
[6387 01-03 17:56:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database
[6388 01-03 17:56:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[6389 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[638a 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[638b 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]
[638c 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]
[638d 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]
[638e 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]
[638f 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]
[6390 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]
[6391 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[6392 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP<00><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]
[6394 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP<00><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]
[6395 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]
[6396 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP<00><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]
[6397 01-03 17:56:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP<00><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe5, 0x92, 0x1f, 0x81, 0x52, 0xdf, 0xf6, 0x8c, 0x18, 0x6c, 0xa4, 0x3c, 0x6b, 0xbe, 0x6, 0xc, 0xfc, 0x47, 0x34, 0x15, 0xdc, 0xc8, 0x17, 0xa4, 0xcf, 0x88, 0xe6, 0x8a, 0xc9, 0x2e, 0xdc, 0xbf}]
[6398 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[6399 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5]
[639a 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]
[639b 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5]
[639c 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[639d 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database
[639e 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions
[639f 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4]
[63a0 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 58ms (state_validation=14ms block_and_pvtdata_commit=24ms state_commit=16ms) commitHash=[e9966650c1b055cecd66d5a5b390e5fb297154da7fb2985474a6eb4e99001402]
[63a1 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408908FF491D1C09CF315...624D0F542C442AB5FE8C65C22A020805
[63a2 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C67B16C6E1AFCF80D27C52E86554DE22D15E1F7478E8945807A1EE9B97BA04B2
[63a3 01-03 17:56:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s)
[63a4 01-03 17:56:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[63a5 01-03 17:56:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[63a6 01-03 17:56:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63a7 01-03 17:56:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63a8 01-03 17:56:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63a9 01-03 17:56:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[63aa 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074214327552500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[63ab 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074214327552500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[63ac 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63ad 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[63ae 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[63af 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[63b0 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[63b1 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[63b2 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[63b3 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[63b4 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[63b5 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[63b6 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358000 gate 1578074214373156200 evaluation starts
[63b7 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358000 signed by 0 principal evaluation starts (used [false])
[63b8 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358000 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[63b9 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[63ba 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358000 principal evaluation fails
[63bb 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358000 gate 1578074214373156200 evaluation fails
[63bc 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[63bd 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[63be 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[63bf 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[63c0 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[63c1 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[63c2 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358900 gate 1578074214373695700 evaluation starts
[63c3 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358900 signed by 0 principal evaluation starts (used [false])
[63c4 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358900 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[63c5 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358900 principal evaluation succeeds for identity 0
[63c6 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004358900 gate 1578074214373695700 evaluation succeeds
[63c7 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[63c8 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[63c9 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[63ca 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[63cb 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63cc 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63cd 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[63ce 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[63cf 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[63d0 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[63d1 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[63d2 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[63d3 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[63d4 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[63d5 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004359760 gate 1578074214378531800 evaluation starts
[63d6 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004359760 signed by 0 principal evaluation starts (used [false])
[63d7 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004359760 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[63d8 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004359760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[63d9 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004359760 principal evaluation fails
[63da 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004359760 gate 1578074214378531800 evaluation fails
[63db 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[63dc 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[63dd 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[63de 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[63df 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[63e0 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[63e1 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a060 gate 1578074214379028100 evaluation starts
[63e2 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a060 signed by 0 principal evaluation starts (used [false])
[63e3 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a060 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[63e4 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a060 principal evaluation succeeds for identity 0
[63e5 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a060 gate 1578074214379028100 evaluation succeeds
[63e6 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[63e7 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[63e8 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[63e9 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[63ea 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[63eb 01-03 17:56:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63ec 01-03 17:56:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63ed 01-03 17:56:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074214327552500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers
[63ee 01-03 17:56:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63ef 01-03 17:56:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63f0 01-03 17:56:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074214327552500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[63f1 01-03 17:56:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[63f2 01-03 17:56:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074214327552500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[63f3 01-03 17:56:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[63f4 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57552
[63f5 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[63f6 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d creator is valid
[63f7 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 56 fc bd a6 ae 15 2f 13 15 47 41 21 b6 dc 21 |eV...../..GA!..!|
00000010 2b 14 62 f3 32 2d 08 6e 1a 30 ef 36 5d d3 84 f4 |+.b.2-.n.0.6]...|
[63f8 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 29 8b 96 e9 d4 59 32 98 0e ad f9 |0D. $)....Y2....|
00000010 64 bd be bd 6a 04 8c dc c8 17 ae 05 a0 82 a7 65 |d...j..........e|
00000020 64 34 e5 7a 02 20 4b e9 b2 e1 71 05 f4 78 94 a1 |d4.z. K...q..x..|
00000030 fd cc 2b 79 e0 3c 0f 91 28 d1 14 59 ee 57 eb 5b |..+y.<..(..Y.W.[|
00000040 f7 6d 8b c2 f6 db |.m....|
[63f9 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d signature is valid
[63fa 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][046aa071] processing txid: 046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d
[63fb 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d]
[63fc 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x30, 0x34, 0x36, 0x61, 0x61, 0x30, 0x37, 0x31, 0x33, 0x33, 0x63, 0x39, 0x66, 0x39, 0x66, 0x33, 0x66, 0x65, 0x62, 0x30, 0x31, 0x36, 0x63, 0x33, 0x63, 0x31, 0x35, 0x38, 0x32, 0x65, 0x66, 0x34, 0x66, 0x35, 0x66, 0x32, 0x66, 0x37, 0x39, 0x63, 0x38, 0x61, 0x30, 0x66, 0x64, 0x33, 0x35, 0x38, 0x30, 0x37, 0x61, 0x32, 0x66, 0x30, 0x32, 0x32, 0x36, 0x62, 0x62, 0x64, 0x33, 0x66, 0x31, 0x64}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x30, 0x34, 0x36, 0x61, 0x61, 0x30, 0x37, 0x31, 0x33, 0x33, 0x63, 0x39, 0x66, 0x39, 0x66, 0x33, 0x66, 0x65, 0x62, 0x30, 0x31, 0x36, 0x63, 0x33, 0x63, 0x31, 0x35, 0x38, 0x32, 0x65, 0x66, 0x34, 0x66, 0x35, 0x66, 0x32, 0x66, 0x37, 0x39, 0x63, 0x38, 0x61, 0x30, 0x66, 0x64, 0x33, 0x35, 0x38, 0x30, 0x37, 0x61, 0x32, 0x66, 0x30, 0x32, 0x32, 0x36, 0x62, 0x62, 0x64, 0x33, 0x66, 0x31, 0x64, 0xff}]
[63fd 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[63fe 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d]
[63ff 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][046aa071] Entry chaincode: _lifecycle
[6400 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][046aa071] Entry chaincode: _lifecycle
[6401 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting chaincode data for _lifecycle on channel businesschannel
[6402 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[6403 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy not found in config for resource _lifecycle/CheckCommitReadiness
[6404 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[6405 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6406 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[6407 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 56 fc bd a6 ae 15 2f 13 15 47 41 21 b6 dc 21 |eV...../..GA!..!|
00000010 2b 14 62 f3 32 2d 08 6e 1a 30 ef 36 5d d3 84 f4 |+.b.2-.n.0.6]...|
[6408 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 29 8b 96 e9 d4 59 32 98 0e ad f9 |0D. $)....Y2....|
00000010 64 bd be bd 6a 04 8c dc c8 17 ae 05 a0 82 a7 65 |d...j..........e|
00000020 64 34 e5 7a 02 20 4b e9 b2 e1 71 05 f4 78 94 a1 |d4.z. K...q..x..|
00000030 fd cc 2b 79 e0 3c 0f 91 28 d1 14 59 ee 57 eb 5b |..+y.<..(..Y.W.[|
00000040 f7 6d 8b c2 f6 db |.m....|
[6409 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[640a 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc0d0 gate 1578074214739586200 evaluation starts
[640b 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc0d0 signed by 0 principal evaluation starts (used [false])
[640c 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc0d0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[640d 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc0d0 principal evaluation succeeds for identity 0
[640e 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc0d0 gate 1578074214739586200 evaluation succeeds
[640f 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[6410 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[6411 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[6412 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[6413 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of CheckCommitReadiness on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: (<nil>)'
[6414 01-03 17:56:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6415 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_STATE from chaincode
[6416 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel
[6417 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6418 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload
[6419 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_STATE. Sending RESPONSE
[641a 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[641b 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_PRIVATE_DATA_HASH from chaincode
[641c 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[641d 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[641e 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[641f 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6420 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6421 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6422 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_PRIVATE_DATA_HASH from chaincode
[6423 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[6424 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6425 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6426 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6427 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_PRIVATE_DATA_HASH from chaincode
[6428 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[6429 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[642a 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[642b 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[642c 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_PRIVATE_DATA_HASH from chaincode
[642d 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[642e 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[642f 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6430 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6431 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_PRIVATE_DATA_HASH from chaincode
[6432 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[6433 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6434 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6435 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6436 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_PRIVATE_DATA_HASH from chaincode
[6437 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[6438 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6439 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[643a 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[643b 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_PRIVATE_DATA_HASH from chaincode
[643c 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[643d 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[643e 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[643f 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6440 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] handling GET_PRIVATE_DATA_HASH from chaincode
[6441 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[6442 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6443 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6444 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> INFO successfully checked commit readiness of chaincode definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (<nil>), name 'exp02' on channel 'businesschannel'
[6445 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[6446 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [046aa071] notifying Txid:046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d, channelID:businesschannel
[6447 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6448 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][046aa071] Exit chaincode: _lifecycle (4ms)
[6449 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[644a 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d]
[644b 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][046aa071] Exit
[644c 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][046aa071] escc for chaincode _lifecycle is escc
[644d 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2025EF9AF2313794E447F32FD4E9A2...455254494649434154452D2D2D2D2D0A
[644e 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 08D14FD1B1477E3FE4D37EC1B6D7D977CD8BA0EE020411A54F07E0F0A9C9FDE5
[644f 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [046aa07133c9f9f3feb016c3c1582ef4f5f2f79c8a0fd35807a2f0226bbd3f1d]
[6450 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57552
[6451 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57552 grpc.code=OK grpc.call_duration=4.7544ms
[6452 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6453 01-03 17:56:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6454 01-03 17:56:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57560
[6455 01-03 17:56:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU a36aa8728f44cdd9a438111df5601d13cff499074ae80aa7db80240d5acc970c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[6456 01-03 17:56:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU a36aa8728f44cdd9a438111df5601d13cff499074ae80aa7db80240d5acc970c creator is valid
[6457 01-03 17:56:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 58 3b 87 e9 76 4d 8d c1 cc b4 ea 9e 6d 07 d6 |.X;..vM......m..|
00000010 74 d3 12 34 10 ca 3d 0d 71 01 18 9f c3 15 f0 c3 |t..4..=.q.......|
[6458 01-03 17:56:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 a8 b7 34 42 ee 41 4d 00 ea 79 be |0D. ...4B.AM..y.|
00000010 d6 f7 77 19 df 6e 91 ee 1d a9 cd 76 72 95 87 e3 |..w..n.....vr...|
00000020 33 ae 82 e9 02 20 68 21 c0 c1 90 86 15 6e dc e0 |3.... h!.....n..|
00000030 3f d2 71 b0 4f 94 05 c2 2d 96 ca 4f 89 8b f2 5f |?.q.O...-..O..._|
00000040 1c 5b 05 e8 95 a3 |.[....|
[6459 01-03 17:56:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU a36aa8728f44cdd9a438111df5601d13cff499074ae80aa7db80240d5acc970c signature is valid
[645a 01-03 17:56:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU [][a36aa872] processing txid: a36aa8728f44cdd9a438111df5601d13cff499074ae80aa7db80240d5acc970c
[645b 01-03 17:56:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU [][a36aa872] Entry chaincode: _lifecycle
[645c 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> INFO [][a36aa872] Entry chaincode: _lifecycle
[645d 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU [a36aa872] getting chaincode data for _lifecycle on channel
[645e 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[645f 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 58 3b 87 e9 76 4d 8d c1 cc b4 ea 9e 6d 07 d6 |.X;..vM......m..|
00000010 74 d3 12 34 10 ca 3d 0d 71 01 18 9f c3 15 f0 c3 |t..4..=.q.......|
[6460 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 a8 b7 34 42 ee 41 4d 00 ea 79 be |0D. ...4B.AM..y.|
00000010 d6 f7 77 19 df 6e 91 ee 1d a9 cd 76 72 95 87 e3 |..w..n.....vr...|
00000020 33 ae 82 e9 02 20 68 21 c0 c1 90 86 15 6e dc e0 |3.... h!.....n..|
00000030 3f d2 71 b0 4f 94 05 c2 2d 96 ca 4f 89 8b f2 5f |?.q.O...-..O..._|
00000040 1c 5b 05 e8 95 a3 |.[....|
[6461 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of QueryInstalledChaincodes
[6462 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU [a36aa872] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[6463 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU [a36aa872] notifying Txid:a36aa8728f44cdd9a438111df5601d13cff499074ae80aa7db80240d5acc970c, channelID:
[6464 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6465 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> INFO [][a36aa872] Exit chaincode: _lifecycle (3ms)
[6466 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU [][a36aa872] Exit
[6467 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57560
[6468 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57560 grpc.code=OK grpc.call_duration=4.7075ms
[6469 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[646a 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:57560: read: connection reset by peer
[646b 01-03 17:56:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[646c 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57564
[646d 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[646e 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67 creator is valid
[646f 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 17 e6 e6 7b 80 70 6a cc d4 8f 11 65 f2 ab 3f |....{.pj....e..?|
00000010 49 46 ca 64 74 d9 35 22 04 2b 02 65 a0 e4 25 a2 |IF.dt.5".+.e..%.|
[6470 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 44 ba 5c 48 b9 84 d0 81 ae 1f |0E.!..D.\H......|
00000010 47 df ab e7 ee ab 13 a7 6c e8 36 e4 98 cd 26 f3 |G.......l.6...&.|
00000020 d5 74 e8 5b 04 02 20 73 4b e9 0e 88 44 1c 08 03 |.t.[.. sK...D...|
00000030 1a fe 7e 0f 52 4c e0 d9 f0 a1 f0 2d 73 d1 b1 2c |..~.RL.....-s..,|
00000040 44 54 9a 25 e2 34 63 |DT.%.4c|
[6471 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67 signature is valid
[6472 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cacaa608] processing txid: cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67
[6473 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67]
[6474 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x61, 0x63, 0x61, 0x61, 0x36, 0x30, 0x38, 0x37, 0x30, 0x33, 0x34, 0x39, 0x64, 0x34, 0x35, 0x31, 0x38, 0x61, 0x37, 0x34, 0x39, 0x32, 0x66, 0x31, 0x64, 0x35, 0x62, 0x64, 0x38, 0x37, 0x63, 0x61, 0x37, 0x37, 0x63, 0x33, 0x65, 0x63, 0x66, 0x35, 0x38, 0x36, 0x65, 0x36, 0x34, 0x39, 0x63, 0x39, 0x62, 0x37, 0x66, 0x37, 0x31, 0x37, 0x35, 0x35, 0x36, 0x38, 0x34, 0x64, 0x64, 0x36, 0x37}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x61, 0x63, 0x61, 0x61, 0x36, 0x30, 0x38, 0x37, 0x30, 0x33, 0x34, 0x39, 0x64, 0x34, 0x35, 0x31, 0x38, 0x61, 0x37, 0x34, 0x39, 0x32, 0x66, 0x31, 0x64, 0x35, 0x62, 0x64, 0x38, 0x37, 0x63, 0x61, 0x37, 0x37, 0x63, 0x33, 0x65, 0x63, 0x66, 0x35, 0x38, 0x36, 0x65, 0x36, 0x34, 0x39, 0x63, 0x39, 0x62, 0x37, 0x66, 0x37, 0x31, 0x37, 0x35, 0x35, 0x36, 0x38, 0x34, 0x64, 0x64, 0x36, 0x37, 0xff}]
[6475 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[6476 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67]
[6477 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cacaa608] Entry chaincode: _lifecycle
[6478 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cacaa608] Entry chaincode: _lifecycle
[6479 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting chaincode data for _lifecycle on channel businesschannel
[647a 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[647b 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition
[647c 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[647d 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[647e 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[647f 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[6480 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 17 e6 e6 7b 80 70 6a cc d4 8f 11 65 f2 ab 3f |....{.pj....e..?|
00000010 49 46 ca 64 74 d9 35 22 04 2b 02 65 a0 e4 25 a2 |IF.dt.5".+.e..%.|
[6481 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 44 ba 5c 48 b9 84 d0 81 ae 1f |0E.!..D.\H......|
00000010 47 df ab e7 ee ab 13 a7 6c e8 36 e4 98 cd 26 f3 |G.......l.6...&.|
00000020 d5 74 e8 5b 04 02 20 73 4b e9 0e 88 44 1c 08 03 |.t.[.. sK...D...|
00000030 1a fe 7e 0f 52 4c e0 d9 f0 a1 f0 2d 73 d1 b1 2c |..~.RL.....-s..,|
00000040 44 54 9a 25 e2 34 63 |DT.%.4c|
[6482 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6483 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e040 gate 1578074215519472100 evaluation starts
[6484 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e040 signed by 0 principal evaluation starts (used [false])
[6485 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e040 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[6486 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e040 principal evaluation succeeds for identity 0
[6487 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e040 gate 1578074215519472100 evaluation succeeds
[6488 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[6489 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[648a 01-03 17:56:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[648b 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[648c 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[648d 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[648e 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>)'
[648f 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6490 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_STATE from chaincode
[6491 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel
[6492 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6493 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload
[6494 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_STATE. Sending RESPONSE
[6495 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6496 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_PRIVATE_DATA_HASH from chaincode
[6497 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[6498 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[6499 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[649a 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[649b 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[649c 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[649d 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_PRIVATE_DATA_HASH from chaincode
[649e 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[649f 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[64a0 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[64a1 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[64a2 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_PRIVATE_DATA_HASH from chaincode
[64a3 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[64a4 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[64a5 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[64a6 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[64a7 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_PRIVATE_DATA_HASH from chaincode
[64a8 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[64a9 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[64aa 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[64ab 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[64ac 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_PRIVATE_DATA_HASH from chaincode
[64ad 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[64ae 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[64af 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[64b0 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[64b1 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_PRIVATE_DATA_HASH from chaincode
[64b2 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[64b3 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[64b4 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[64b5 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[64b6 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_PRIVATE_DATA_HASH from chaincode
[64b7 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[64b8 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[64b9 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[64ba 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[64bb 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_PRIVATE_DATA_HASH from chaincode
[64bc 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[64bd 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[64be 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[64bf 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> INFO successfully checked commit readiness of chaincode definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>), name 'exp02' on channel 'businesschannel'
[64c0 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[64c1 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling GET_STATE from chaincode
[64c2 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel
[64c3 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[64c4 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload
[64c5 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed GET_STATE. Sending RESPONSE
[64c6 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[64c7 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling PUT_STATE from chaincode
[64c8 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed PUT_STATE. Sending RESPONSE
[64c9 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[64ca 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling PUT_STATE from chaincode
[64cb 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed PUT_STATE. Sending RESPONSE
[64cc 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[64cd 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling PUT_STATE from chaincode
[64ce 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed PUT_STATE. Sending RESPONSE
[64cf 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[64d0 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling PUT_STATE from chaincode
[64d1 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed PUT_STATE. Sending RESPONSE
[64d2 01-03 17:56:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[64d3 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] handling PUT_STATE from chaincode
[64d4 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Completed PUT_STATE. Sending RESPONSE
[64d5 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> INFO successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>), name 'exp02' on channel 'businesschannel'
[64d6 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[64d7 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU [cacaa608] notifying Txid:cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67, channelID:businesschannel
[64d8 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[64d9 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cacaa608] Exit chaincode: _lifecycle (19ms)
[64da 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[64db 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67]
[64dc 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cacaa608] Exit
[64dd 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cacaa608] escc for chaincode _lifecycle is escc
[64de 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2024B864B3064C6F6E1F8247E787DC...455254494649434154452D2D2D2D2D0A
[64df 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 818A36528D25D5F5A5E3FE702F11CF378725F5A1E9A8CB0DFB5752272166464B
[64e0 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67]
[64e1 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57564
[64e2 01-03 17:56:55.53 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57564 grpc.code=OK grpc.call_duration=22.1977ms
[64e3 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Starting new DeliverFiltered handler
[64e4 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Starting new deliver loop for 172.18.0.9:57566
[64e5 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to read seek info message from 172.18.0.9:57566
[64e6 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock
[64e7 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[64e8 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[64e9 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[64ea 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[64eb 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 4e d2 7f ae 47 b7 05 a3 a9 e4 3c c7 c9 ab f1 |.N...G.....<....|
00000010 0c 5e 01 48 ee c4 8c 86 68 fe e2 a4 40 f9 be ec |.^.H....h...@...|
[64ec 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f d1 e1 4d ab b3 cc e7 48 e0 fa 13 |0D. o..M....H...|
00000010 6c 78 a8 19 7d de 57 97 b9 22 89 96 73 bc dc 49 |lx..}.W.."..s..I|
00000020 34 7f e0 03 02 20 7c d8 ef 47 61 b3 d0 32 d1 e2 |4.... |..Ga..2..|
00000030 fa 08 13 d2 0a b3 62 3c be 6a 10 77 de a2 0a 52 |......b<.j.w...R|
00000040 ac c6 21 70 22 d2 |..!p".|
[64ed 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[64ee 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cadf0 gate 1578074215575590300 evaluation starts
[64ef 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cadf0 signed by 0 principal evaluation starts (used [false])
[64f0 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cadf0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[64f1 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cadf0 principal evaluation succeeds for identity 0
[64f2 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cadf0 gate 1578074215575590300 evaluation succeeds
[64f3 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[64f4 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[64f5 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[64f6 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[64f7 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Received seekInfo (0xc0044c4580) start:<newest:<> > stop:<specified:<number:18446744073709551615 > > from 172.18.0.9:57566
[64f8 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing block stream for iterator. itr.maxBlockNumAvailable=4
[64f9 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[76200]
[64fa 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[4777], Going to peek [8] bytes
[64fb 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[4775], placementInfo={fileNum=[0], startOffset=[76200], bytesOffset=[76202]}
[64fc 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU blockbytes [4775] read from file [0]
[64fd 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Delivering block [4] for (0xc0044c4580) for 172.18.0.9:57566
[64fe 01-03 17:56:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]
[64ff 01-03 17:56:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:7013200939137125501 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6500 01-03 17:56:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7013200939137125501 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6501 01-03 17:56:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[6502 01-03 17:56:55.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6503 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[6504 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6505 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[6506 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[6507 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f0 a9 9b 59 d7 bb 3e 4e 53 e5 b4 e0 53 55 64 |/...Y..>NS...SUd|
00000010 ee f9 22 cc 9f 9c 9b ad 3b 53 86 79 3c cc 0c 76 |..".....;S.y<..v|
[6508 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 64 09 6a 0c 4a 50 9d 72 45 cc |0E.!..d.j.JP.rE.|
00000010 5d 2c 31 71 4f 23 30 07 4a 2f 2b 8c de 38 8e ba |],1qO#0.J/+..8..|
00000020 ce 10 d9 cc ba 02 20 44 e9 b6 fb 11 0e bd db 90 |...... D........|
00000030 c3 8c 65 e0 38 e3 47 0e 19 4d 48 b0 30 07 3a 9a |..e.8.G..MH.0.:.|
00000040 5b 0b 73 a2 ff d8 b6 |[.s....|
[6509 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[650a 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab af 2f ee b2 7e 91 e9 4c e2 d6 |0E.!.../..~..L..|
00000010 82 cd a5 23 a0 c3 08 82 3f fd d3 c2 77 67 f1 e0 |...#....?...wg..|
00000020 63 fd b5 bf e3 02 20 58 fb 44 36 7d d9 b8 a4 87 |c..... X.D6}....|
00000030 b0 91 22 ad 7b ae ac ac f3 c3 1b e6 bb bc 22 b1 |..".{.........".|
00000040 3d c4 cf 8d 52 4e 9c |=...RN.|
[650b 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[650c 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[650d 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:77
[650e 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:77
[650f 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[6510 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6511 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6512 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6513 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[6514 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6515 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6516 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[6517 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[6518 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[6519 01-03 17:56:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[651a 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[651b 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[651c 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315101B1801
[651d 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 45B9F3FC120AF094D3F2F34337E441A8D5EB1AB3D138700E84F163BF56FA072E
[651e 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[651f 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6520 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6521 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6522 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6523 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:27 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[6524 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:27 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[6525 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6526 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6527 01-03 17:56:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6528 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6529 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[652a 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[652b 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[652c 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 26 64 d5 5e 0d ac ca b6 8e 92 dd 6b ff ee 61 |.&d.^.......k..a|
00000010 22 71 fb fa 3d fd 8a 21 08 1a a7 f4 8f e5 b6 f6 |"q..=..!........|
[652d 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 66 7b f7 fb 1a b6 3f a1 c4 e4 31 17 |0C..f{....?...1.|
00000010 df f8 7e ea 96 4e 12 6c aa 10 18 1e fc da 1b 35 |..~..N.l.......5|
00000020 39 a9 42 02 20 3c 04 dc b5 39 81 1a 73 fe 37 55 |9.B. <...9..s.7U|
00000030 44 43 4b c6 4d c5 0c 69 e9 5b 11 75 83 54 ee a5 |DCK.M..i.[.u.T..|
00000040 8b 16 b9 f5 f1 |.....|
[652e 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[652f 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f a7 b7 bd 85 2a 09 5e 35 15 0d |0E.!......*.^5..|
00000010 51 c0 d8 27 69 4a 3c be f1 7b 92 5e 70 c4 35 72 |Q..'iJ<..{.^p.5r|
00000020 d2 02 b7 7c f1 02 20 58 b6 b0 c7 42 e8 03 71 0d |...|.. X...B..q.|
00000030 55 25 bb 8e 2a 14 a3 37 7a 80 61 51 04 2e 5e fc |U%..*..7z.aQ..^.|
00000040 73 54 ce 74 3f c5 ae |sT.t?..|
[6530 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6531 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[6532 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78
[6533 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78
[6534 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[6535 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6536 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6537 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6538 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6539 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[653a 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[653b 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes to 1 peers
[653c 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[653d 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes to 1 peers
[653e 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes
[653f 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6540 01-03 17:56:56.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes
[6541 01-03 17:56:56.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6542 01-03 17:56:56.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes
[6543 01-03 17:56:56.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes
[6544 01-03 17:56:56.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6545 01-03 17:56:56.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes
[6546 01-03 17:56:56.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6547 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:8051916291064943256 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6548 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:8051916291064943256 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6549 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8051916291064943256 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[654a 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[654b 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[654c 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[654d 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[654e 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[654f 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6550 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[6551 01-03 17:56:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6552 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6234014660667893692 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6553 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:6234014660667893692 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6554 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6234014660667893692 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6555 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6556 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6557 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6558 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6559 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[655a 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[655b 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[655c 01-03 17:56:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[655d 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[655e 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[655f 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6560 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6561 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6562 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6563 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6564 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6565 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6566 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6567 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6568 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6569 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 42 54 a3 2f 96 ae 65 7a e5 83 68 35 5a 48 3a |UBT./..ez..h5ZH:|
00000010 b5 a9 1d 1a 19 fb ca ad f7 0b 80 2e d6 41 ba c9 |.............A..|
[656a 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 7e 22 96 ce 08 10 82 fb c0 23 38 |0D. .~".......#8|
00000010 03 2c af 1e 4a 44 fe 83 92 71 b6 77 7c 14 0e 93 |.,..JD...q.w|...|
00000020 b5 4a 90 1d 02 20 79 ba fa 2e 46 62 fa 6a 31 f3 |.J... y...Fb.j1.|
00000030 5e d3 dc 55 52 70 c9 f5 f3 d3 0a f8 32 78 61 85 |^..URp......2xa.|
00000040 9b 28 9d d8 f1 80 |.(....|
[656b 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[656c 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045656b0 gate 1578074217143624100 evaluation starts
[656d 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045656b0 signed by 0 principal evaluation starts (used [false])
[656e 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045656b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[656f 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045656b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6570 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045656b0 principal evaluation fails
[6571 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045656b0 gate 1578074217143624100 evaluation fails
[6572 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6573 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6574 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6575 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 42 54 a3 2f 96 ae 65 7a e5 83 68 35 5a 48 3a |UBT./..ez..h5ZH:|
00000010 b5 a9 1d 1a 19 fb ca ad f7 0b 80 2e d6 41 ba c9 |.............A..|
[6576 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 7e 22 96 ce 08 10 82 fb c0 23 38 |0D. .~".......#8|
00000010 03 2c af 1e 4a 44 fe 83 92 71 b6 77 7c 14 0e 93 |.,..JD...q.w|...|
00000020 b5 4a 90 1d 02 20 79 ba fa 2e 46 62 fa 6a 31 f3 |.J... y...Fb.j1.|
00000030 5e d3 dc 55 52 70 c9 f5 f3 d3 0a f8 32 78 61 85 |^..URp......2xa.|
00000040 9b 28 9d d8 f1 80 |.(....|
[6577 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6578 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565fb0 gate 1578074217146004300 evaluation starts
[6579 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565fb0 signed by 0 principal evaluation starts (used [false])
[657a 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565fb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[657b 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565fb0 principal evaluation succeeds for identity 0
[657c 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565fb0 gate 1578074217146004300 evaluation succeeds
[657d 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[657e 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[657f 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6580 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6581 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6582 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes]}
[6583 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77
[6584 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77
[6585 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6586 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6587 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6588 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6589 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[658a 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[658b 01-03 17:56:57.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[658c 01-03 17:56:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[658d 01-03 17:56:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[658e 01-03 17:56:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[658f 01-03 17:56:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6590 01-03 17:56:57.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6591 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6592 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6593 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6594 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6595 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[6596 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6597 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6598 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6599 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[659a 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[659b 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[659c 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[659d 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 e7 b5 fe 05 70 a8 5f 14 1d 61 57 58 54 1a 27 |S....p._..aWXT.'|
00000010 a8 b2 e9 b3 ac df 4d ee 40 ae e0 8c 53 8e d3 61 |......M.@...S..a|
[659e 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e d5 2b b3 69 c0 13 91 a2 47 89 30 |0D. ^.+.i....G.0|
00000010 28 a5 40 70 e9 02 d5 b2 cc 6d 84 c1 ab cf a9 43 |(.@p.....m.....C|
00000020 57 86 9c 78 02 20 1b 31 22 15 06 72 fb 93 93 0e |W..x. .1"..r....|
00000030 1e 17 2e f3 80 df a4 56 e1 94 03 d4 83 a5 4f 40 |.......V......O@|
00000040 29 bf 51 fe 44 04 |).Q.D.|
[659f 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[65a0 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004598ed0 gate 1578074217175844100 evaluation starts
[65a1 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004598ed0 signed by 0 principal evaluation starts (used [false])
[65a2 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004598ed0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[65a3 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004598ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[65a4 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004598ed0 principal evaluation fails
[65a5 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004598ed0 gate 1578074217175844100 evaluation fails
[65a6 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[65a7 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[65a8 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[65a9 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 e7 b5 fe 05 70 a8 5f 14 1d 61 57 58 54 1a 27 |S....p._..aWXT.'|
00000010 a8 b2 e9 b3 ac df 4d ee 40 ae e0 8c 53 8e d3 61 |......M.@...S..a|
[65aa 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e d5 2b b3 69 c0 13 91 a2 47 89 30 |0D. ^.+.i....G.0|
00000010 28 a5 40 70 e9 02 d5 b2 cc 6d 84 c1 ab cf a9 43 |(.@p.....m.....C|
00000020 57 86 9c 78 02 20 1b 31 22 15 06 72 fb 93 93 0e |W..x. .1"..r....|
00000030 1e 17 2e f3 80 df a4 56 e1 94 03 d4 83 a5 4f 40 |.......V......O@|
00000040 29 bf 51 fe 44 04 |).Q.D.|
[65ab 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[65ac 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045997d0 gate 1578074217178043200 evaluation starts
[65ad 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045997d0 signed by 0 principal evaluation starts (used [false])
[65ae 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045997d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[65af 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045997d0 principal evaluation succeeds for identity 0
[65b0 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045997d0 gate 1578074217178043200 evaluation succeeds
[65b1 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[65b2 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[65b3 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[65b4 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[65b5 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[65b6 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes]}
[65b7 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75
[65b8 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75
[65b9 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[65ba 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65bb 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65bc 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65bd 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[65be 01-03 17:56:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65bf 01-03 17:56:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65c0 01-03 17:56:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65c1 01-03 17:56:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers
[65c2 01-03 17:56:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[65c3 01-03 17:56:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes
[65c4 01-03 17:56:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65c5 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[65c6 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10417000253783710219 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[65c7 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10417000253783710219 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[65c8 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65c9 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[65ca 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2186189445735712223 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[65cb 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[65cc 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16384408570157763385 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[65cd 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2186189445735712223 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[65ce 01-03 17:56:57.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65cf 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16384408570157763385 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[65d0 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65d1 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2186189445735712223 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[65d2 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2186189445735712223 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[65d3 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2186189445735712223 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[65d4 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65d5 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10417000253783710219 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[65d6 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10417000253783710219 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[65d7 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10417000253783710219 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[65d8 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65d9 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16384408570157763385 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[65da 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16384408570157763385 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[65db 01-03 17:56:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65dc 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315104A
[65dd 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1151B73EF1B7637133940A57A559DBE07822F4313D7F26C35DC332CB5674FD66
[65de 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[65df 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[65e0 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[65e1 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65e2 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[65e3 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65e4 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[65e5 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[65e6 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65e7 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[65e8 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65e9 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[65ea 01-03 17:56:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65eb 01-03 17:56:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes
[65ec 01-03 17:56:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes
[65ed 01-03 17:56:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65ee 01-03 17:56:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes
[65ef 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[65f0 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65f1 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[65f2 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[65f3 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[65f4 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[65f5 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[65f6 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[65f7 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 e7 b5 fe 05 70 a8 5f 14 1d 61 57 58 54 1a 27 |S....p._..aWXT.'|
00000010 a8 b2 e9 b3 ac df 4d ee 40 ae e0 8c 53 8e d3 61 |......M.@...S..a|
[65f8 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e d5 2b b3 69 c0 13 91 a2 47 89 30 |0D. ^.+.i....G.0|
00000010 28 a5 40 70 e9 02 d5 b2 cc 6d 84 c1 ab cf a9 43 |(.@p.....m.....C|
00000020 57 86 9c 78 02 20 1b 31 22 15 06 72 fb 93 93 0e |W..x. .1"..r....|
00000030 1e 17 2e f3 80 df a4 56 e1 94 03 d4 83 a5 4f 40 |.......V......O@|
00000040 29 bf 51 fe 44 04 |).Q.D.|
[65f9 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[65fa 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c78a0 gate 1578074217342887300 evaluation starts
[65fc 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c78a0 signed by 0 principal evaluation starts (used [false])
[65fd 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c78a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[65fe 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c78a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[65ff 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c78a0 principal evaluation fails
[6600 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c78a0 gate 1578074217342887300 evaluation fails
[65fb 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6601 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6602 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6603 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6605 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 e7 b5 fe 05 70 a8 5f 14 1d 61 57 58 54 1a 27 |S....p._..aWXT.'|
00000010 a8 b2 e9 b3 ac df 4d ee 40 ae e0 8c 53 8e d3 61 |......M.@...S..a|
[6606 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e d5 2b b3 69 c0 13 91 a2 47 89 30 |0D. ^.+.i....G.0|
00000010 28 a5 40 70 e9 02 d5 b2 cc 6d 84 c1 ab cf a9 43 |(.@p.....m.....C|
00000020 57 86 9c 78 02 20 1b 31 22 15 06 72 fb 93 93 0e |W..x. .1"..r....|
00000030 1e 17 2e f3 80 df a4 56 e1 94 03 d4 83 a5 4f 40 |.......V......O@|
00000040 29 bf 51 fe 44 04 |).Q.D.|
[6607 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6608 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f41a0 gate 1578074217347331700 evaluation starts
[6609 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f41a0 signed by 0 principal evaluation starts (used [false])
[660a 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f41a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[660b 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f41a0 principal evaluation succeeds for identity 0
[660c 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f41a0 gate 1578074217347331700 evaluation succeeds
[660d 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[660e 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[660f 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6610 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6611 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[6612 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6613 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6614 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 51 b7 3e f1 b7 63 71 33 94 0a 57 a5 59 db e0 |.Q.>..cq3..W.Y..|
00000010 78 22 f4 31 3d 7f 26 c3 5d c3 32 cb 56 74 fd 66 |x".1=.&.].2.Vt.f|
[6615 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 e0 f7 27 ed 68 08 0d 82 0b 6e 89 |0D. R..'.h....n.|
00000010 60 ec d8 59 e6 b1 2a 95 d0 9b 7b 71 11 75 3c 33 |`..Y..*...{q.u<3|
00000020 ab ca 9b 8a 02 20 1d 0d 1b c5 a1 69 54 4a 16 14 |..... .....iTJ..|
00000030 bf e9 72 ad c2 31 26 12 ab 80 fa b5 94 1f d7 45 |..r..1&........E|
00000040 23 a5 51 f0 58 28 |#.Q.X(|
[6616 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[6617 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[6618 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6619 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6604 01-03 17:56:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[661a 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[661b 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[661c 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[661d 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[661e 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[661f 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6620 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6621 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6622 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6623 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6624 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 42 54 a3 2f 96 ae 65 7a e5 83 68 35 5a 48 3a |UBT./..ez..h5ZH:|
00000010 b5 a9 1d 1a 19 fb ca ad f7 0b 80 2e d6 41 ba c9 |.............A..|
[6625 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 7e 22 96 ce 08 10 82 fb c0 23 38 |0D. .~".......#8|
00000010 03 2c af 1e 4a 44 fe 83 92 71 b6 77 7c 14 0e 93 |.,..JD...q.w|...|
00000020 b5 4a 90 1d 02 20 79 ba fa 2e 46 62 fa 6a 31 f3 |.J... y...Fb.j1.|
00000030 5e d3 dc 55 52 70 c9 f5 f3 d3 0a f8 32 78 61 85 |^..URp......2xa.|
00000040 9b 28 9d d8 f1 80 |.(....|
[6626 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6627 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602b60 gate 1578074217358934800 evaluation starts
[6628 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602b60 signed by 0 principal evaluation starts (used [false])
[6629 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602b60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[662a 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[662b 01-03 17:56:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602b60 principal evaluation fails
[662c 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004602b60 gate 1578074217358934800 evaluation fails
[662d 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[662e 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[662f 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6630 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 42 54 a3 2f 96 ae 65 7a e5 83 68 35 5a 48 3a |UBT./..ez..h5ZH:|
00000010 b5 a9 1d 1a 19 fb ca ad f7 0b 80 2e d6 41 ba c9 |.............A..|
[6631 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 7e 22 96 ce 08 10 82 fb c0 23 38 |0D. .~".......#8|
00000010 03 2c af 1e 4a 44 fe 83 92 71 b6 77 7c 14 0e 93 |.,..JD...q.w|...|
00000020 b5 4a 90 1d 02 20 79 ba fa 2e 46 62 fa 6a 31 f3 |.J... y...Fb.j1.|
00000030 5e d3 dc 55 52 70 c9 f5 f3 d3 0a f8 32 78 61 85 |^..URp......2xa.|
00000040 9b 28 9d d8 f1 80 |.(....|
[6632 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6633 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603460 gate 1578074217362483900 evaluation starts
[6634 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603460 signed by 0 principal evaluation starts (used [false])
[6635 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603460 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6636 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603460 principal evaluation succeeds for identity 0
[6637 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004603460 gate 1578074217362483900 evaluation succeeds
[6638 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[6639 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[663a 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[663b 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[663c 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[663d 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[663e 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[663f 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6640 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 51 b7 3e f1 b7 63 71 33 94 0a 57 a5 59 db e0 |.Q.>..cq3..W.Y..|
00000010 78 22 f4 31 3d 7f 26 c3 5d c3 32 cb 56 74 fd 66 |x".1=.&.].2.Vt.f|
[6641 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 e0 f7 27 ed 68 08 0d 82 0b 6e 89 |0D. R..'.h....n.|
00000010 60 ec d8 59 e6 b1 2a 95 d0 9b 7b 71 11 75 3c 33 |`..Y..*...{q.u<3|
00000020 ab ca 9b 8a 02 20 1d 0d 1b c5 a1 69 54 4a 16 14 |..... .....iTJ..|
00000030 bf e9 72 ad c2 31 26 12 ab 80 fa b5 94 1f d7 45 |..r..1&........E|
00000040 23 a5 51 f0 58 28 |#.Q.X(|
[6642 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[6643 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[6644 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6645 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6646 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[6647 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6648 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6649 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 51 b7 3e f1 b7 63 71 33 94 0a 57 a5 59 db e0 |.Q.>..cq3..W.Y..|
00000010 78 22 f4 31 3d 7f 26 c3 5d c3 32 cb 56 74 fd 66 |x".1=.&.].2.Vt.f|
[664a 01-03 17:56:57.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 e0 f7 27 ed 68 08 0d 82 0b 6e 89 |0D. R..'.h....n.|
00000010 60 ec d8 59 e6 b1 2a 95 d0 9b 7b 71 11 75 3c 33 |`..Y..*...{q.u<3|
00000020 ab ca 9b 8a 02 20 1d 0d 1b c5 a1 69 54 4a 16 14 |..... .....iTJ..|
00000030 bf e9 72 ad c2 31 26 12 ab 80 fa b5 94 1f d7 45 |..r..1&........E|
00000040 23 a5 51 f0 58 28 |#.Q.X(|
[664b 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[664c 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 6f 81 33 04 3e 29 b8 d6 76 d8 |0E.!..o.3.>)..v.|
00000010 56 42 52 aa dc f4 12 e4 0f 61 fb f1 d2 6d 13 23 |VBR......a...m.#|
00000020 fe 53 31 ea 41 02 20 51 91 22 a5 6a 6d c9 e3 6b |.S1.A. Q.".jm..k|
00000030 27 e2 b0 2c 0d 62 75 13 82 e9 be 87 fd 85 53 97 |'..,.bu.......S.|
00000040 ae 33 2d d7 1f ba 50 |.3-...P|
[664d 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[664e 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[664f 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6650 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6651 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6652 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6653 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6655 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074214283436800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers
[6656 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6654 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6658 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[6659 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[665a 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[665b 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074214283436800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes
[665c 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6657 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[665d 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074214283436800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes
[6662 01-03 17:56:57.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[665e 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6663 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[665f 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6664 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6660 01-03 17:56:57.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074214283436800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes
[6665 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6661 01-03 17:56:57.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes
[6666 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes
[6667 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6668 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6669 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[666a 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[666b 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[666c 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[666d 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[666e 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[666f 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6670 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[6671 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[6672 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6673 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664360 gate 1578074217398955000 evaluation starts
[6674 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664360 signed by 0 principal evaluation starts (used [false])
[6675 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664360 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6676 01-03 17:56:57.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6677 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664360 principal evaluation fails
[6678 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664360 gate 1578074217398955000 evaluation fails
[6679 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[667a 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[667b 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[667c 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[667d 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[667e 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[667f 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664c60 gate 1578074217404510300 evaluation starts
[6680 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664c60 signed by 0 principal evaluation starts (used [false])
[6681 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664c60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6682 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664c60 principal evaluation succeeds for identity 0
[6683 01-03 17:56:57.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004664c60 gate 1578074217404510300 evaluation succeeds
[6684 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6685 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6686 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6687 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6688 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes
[6689 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 7b 16 c6 e1 af cf 80 d2 7c 52 e8 65 54 de 22 |.{.......|R.eT."|
00000010 d1 5e 1f 74 78 e8 94 58 07 a1 ee 9b 97 ba 04 b2 |.^.tx..X........|
[668a 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 9d 7b 06 69 3d dd bb 4f 0c 3c 36 |0D. 9.{.i=..O.<6|
00000010 3e dd 66 92 b5 06 f4 15 c9 92 f2 dd eb 3d b0 0c |>.f..........=..|
00000020 16 14 d7 1f 02 20 56 39 85 7e 89 b0 57 55 32 d5 |..... V9.~..WU2.|
00000030 58 58 3a 00 46 35 83 83 de e7 84 62 d4 05 d6 18 |XX:.F5.....b....|
00000040 d1 70 6c 7d 29 ab |.pl}).|
[668b 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[668c 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[668d 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[668e 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[668f 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6690 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6691 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6692 01-03 17:56:57.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6693 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[6694 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[6695 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6696 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467cd70 gate 1578074217422259500 evaluation starts
[6697 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467cd70 signed by 0 principal evaluation starts (used [false])
[6698 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467cd70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6699 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467cd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[669a 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467cd70 principal evaluation fails
[669b 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467cd70 gate 1578074217422259500 evaluation fails
[669c 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[669d 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[669e 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[669f 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[66a0 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[66a1 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66a2 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467d670 gate 1578074217428361700 evaluation starts
[66a3 01-03 17:56:57.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467d670 signed by 0 principal evaluation starts (used [false])
[66a4 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467d670 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[66a5 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467d670 principal evaluation succeeds for identity 0
[66a6 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467d670 gate 1578074217428361700 evaluation succeeds
[66a7 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[66a8 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[66a9 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[66aa 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[66ab 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66ac 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[66ad 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[66ae 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[66af 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[66b0 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[66b1 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[66b2 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[66b3 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66b4 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a400 gate 1578074217438441900 evaluation starts
[66b5 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a400 signed by 0 principal evaluation starts (used [false])
[66b6 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a400 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[66b7 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[66b8 01-03 17:56:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a400 principal evaluation fails
[66b9 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a400 gate 1578074217438441900 evaluation fails
[66ba 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[66bb 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[66bc 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[66bd 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[66be 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[66bf 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66c0 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469ad00 gate 1578074217443731900 evaluation starts
[66c1 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469ad00 signed by 0 principal evaluation starts (used [false])
[66c2 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469ad00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[66c3 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469ad00 principal evaluation succeeds for identity 0
[66c4 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469ad00 gate 1578074217443731900 evaluation succeeds
[66c5 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[66c6 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[66c7 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[66c8 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[66c9 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 67 d3 54 ad 84 28 a5 83 66 ab a4 41 cd c8 71 |.g.T..(..f..A..q|
00000010 f5 4c 18 10 4a 49 48 7e 98 92 f8 8f ee 83 5a b6 |.L..JIH~......Z.|
[66ca 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 3c c0 41 32 b6 f5 b9 2e 3e ad |0E.!..<.A2....>.|
00000010 27 e9 b6 df ff e1 77 1a 8b df 6e 98 39 ad 9f a4 |'.....w...n.9...|
00000020 ca b4 5a 12 6c 02 20 68 e3 6a 6c d0 c4 cb 39 29 |..Z.l. h.jl...9)|
00000030 1f 83 4a e1 69 d1 e9 da f3 79 41 08 3d 61 ce ff |..J.i....yA.=a..|
00000040 63 7b 3a 13 45 a7 50 |c{:.E.P|
[66cb 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[66cc 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[66cd 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[66ce 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[66cf 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[66d0 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 67 d3 54 ad 84 28 a5 83 66 ab a4 41 cd c8 71 |.g.T..(..f..A..q|
00000010 f5 4c 18 10 4a 49 48 7e 98 92 f8 8f ee 83 5a b6 |.L..JIH~......Z.|
[66d1 01-03 17:56:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 3c c0 41 32 b6 f5 b9 2e 3e ad |0E.!..<.A2....>.|
00000010 27 e9 b6 df ff e1 77 1a 8b df 6e 98 39 ad 9f a4 |'.....w...n.9...|
00000020 ca b4 5a 12 6c 02 20 68 e3 6a 6c d0 c4 cb 39 29 |..Z.l. h.jl...9)|
00000030 1f 83 4a e1 69 d1 e9 da f3 79 41 08 3d 61 ce ff |..J.i....yA.=a..|
00000040 63 7b 3a 13 45 a7 50 |c{:.E.P|
[66d2 01-03 17:56:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66d3 01-03 17:56:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8070 gate 1578074217457477800 evaluation starts
[66d4 01-03 17:56:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8070 signed by 0 principal evaluation starts (used [false])
[66d5 01-03 17:56:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8070 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[66d6 01-03 17:56:57.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8070 principal evaluation succeeds for identity 0
[66d7 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8070 gate 1578074217457477800 evaluation succeeds
[66d8 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[66d9 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[66da 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[66db 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[66dc 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[66dd 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes
[66de 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66df 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 91 29 d1 35 e7 1d fd a5 13 82 f9 b1 d1 86 35 |..).5..........5|
00000010 d8 b7 4f 4d 60 2f 0f 76 8b 07 a8 a8 66 96 ff 15 |..OM`/.v....f...|
[66e0 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 94 83 e0 d2 69 76 db c8 be 8b |0E.!......iv....|
00000010 c5 d0 92 34 78 b3 56 b2 4f 1e ae f4 1a bf 8c e1 |...4x.V.O.......|
00000020 77 b3 f1 1e 22 02 20 69 c1 2c 09 69 39 54 40 7a |w...". i.,.i9T@z|
00000030 0f df 75 17 95 ca 36 4a 23 37 53 43 f9 c3 b7 bf |..u...6J#7SC....|
00000040 d4 a1 35 ee 7e 84 14 |..5.~..|
[66e1 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 97 1d 29 6c 59 a4 49 3e a2 6b cc bc d6 d6 e3 |...)lY.I>.k.....|
00000010 42 a4 40 42 36 1c a7 00 5f ef 9f 1d 2e 66 29 15 |B.@B6..._....f).|
[66e2 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 fe 8e 06 07 40 e7 71 da f0 a8 08 |0D. x....@.q....|
00000010 49 ef 6b 4e 94 e2 88 d0 ea b6 20 0c 74 50 42 9d |I.kN...... .tPB.|
00000020 6c 98 b0 a1 02 20 54 76 39 b1 50 43 d2 5c 77 b3 |l.... Tv9.PC.\w.|
00000030 01 c1 b7 80 00 a4 1e 4b 50 0a 00 87 e4 00 f9 cc |.......KP.......|
00000040 f1 c2 13 39 da 55 |...9.U|
[66e3 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66e4 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66e5 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[66e6 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[66e7 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[66e8 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[66e9 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[66ea 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[66eb 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[66ec 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[66ed 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66ee 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c2ae0 gate 1578074217468342100 evaluation starts
[66ef 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c2ae0 signed by 0 principal evaluation starts (used [false])
[66f0 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c2ae0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[66f1 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c2ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[66f2 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c2ae0 principal evaluation fails
[66f3 01-03 17:56:57.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c2ae0 gate 1578074217468342100 evaluation fails
[66f4 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[66f5 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[66f6 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[66f7 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[66f8 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[66f9 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66fa 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c33e0 gate 1578074217472315900 evaluation starts
[66fb 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c33e0 signed by 0 principal evaluation starts (used [false])
[66fc 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c33e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[66fd 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c33e0 principal evaluation succeeds for identity 0
[66fe 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c33e0 gate 1578074217472315900 evaluation succeeds
[66ff 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6700 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6701 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6702 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6703 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6704 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6705 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6706 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6707 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6708 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6709 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[670a 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[670b 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[670c 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[670d 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[670e 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d4e40 gate 1578074217477802000 evaluation starts
[670f 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d4e40 signed by 0 principal evaluation starts (used [false])
[6710 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d4e40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6711 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d4e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6712 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d4e40 principal evaluation fails
[6713 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d4e40 gate 1578074217477802000 evaluation fails
[6714 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6715 01-03 17:56:57.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6716 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6717 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[6718 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[6719 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[671a 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d5740 gate 1578074217482267300 evaluation starts
[671b 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d5740 signed by 0 principal evaluation starts (used [false])
[671c 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d5740 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[671d 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d5740 principal evaluation succeeds for identity 0
[671e 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d5740 gate 1578074217482267300 evaluation succeeds
[671f 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6720 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6721 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6722 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6723 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6724 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes
[6725 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6726 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6727 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6728 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6729 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[672a 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[672b 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[672c 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[672d 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[672e 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[672f 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6730 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ef380 gate 1578074217488265300 evaluation starts
[6731 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ef380 signed by 0 principal evaluation starts (used [false])
[6732 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ef380 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6733 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ef380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6734 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ef380 principal evaluation fails
[6735 01-03 17:56:57.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ef380 gate 1578074217488265300 evaluation fails
[6736 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6737 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6738 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6739 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 89 a4 bf e6 4a 48 f4 35 f1 f2 ec e4 fd cb ce |D....JH.5.......|
00000010 b5 89 da 96 a5 8b 11 62 2a 6e 3a 42 12 2f 8d 91 |.......b*n:B./..|
[673a 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 01 b7 1a 1d 48 59 38 71 58 f2 26 |0D. (....HY8qX.&|
00000010 7a b5 72 22 df ac 91 62 11 bc 34 58 35 fd f4 e1 |z.r"...b..4X5...|
00000020 99 cf 49 35 02 20 51 7c d8 3c 61 63 d4 c6 1d 73 |..I5. Q|.<ac...s|
00000030 ab 42 47 1e 1c 1e 4c ef 2f ef 87 30 9d da f7 36 |.BG...L./..0...6|
00000040 fb b4 cb 12 be cb |......|
[673b 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[673c 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046efc80 gate 1578074217492410600 evaluation starts
[673d 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046efc80 signed by 0 principal evaluation starts (used [false])
[673e 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046efc80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[673f 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046efc80 principal evaluation succeeds for identity 0
[6740 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046efc80 gate 1578074217492410600 evaluation succeeds
[6741 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6742 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6743 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6744 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6745 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 67 d3 54 ad 84 28 a5 83 66 ab a4 41 cd c8 71 |.g.T..(..f..A..q|
00000010 f5 4c 18 10 4a 49 48 7e 98 92 f8 8f ee 83 5a b6 |.L..JIH~......Z.|
[6746 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 3c c0 41 32 b6 f5 b9 2e 3e ad |0E.!..<.A2....>.|
00000010 27 e9 b6 df ff e1 77 1a 8b df 6e 98 39 ad 9f a4 |'.....w...n.9...|
00000020 ca b4 5a 12 6c 02 20 68 e3 6a 6c d0 c4 cb 39 29 |..Z.l. h.jl...9)|
00000030 1f 83 4a e1 69 d1 e9 da f3 79 41 08 3d 61 ce ff |..J.i....yA.=a..|
00000040 63 7b 3a 13 45 a7 50 |c{:.E.P|
[6747 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6748 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6749 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[674a 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[674b 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[674c 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[674d 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[674e 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[674f 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[6750 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[6751 01-03 17:56:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6752 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004705d90 gate 1578074217500035500 evaluation starts
[6753 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004705d90 signed by 0 principal evaluation starts (used [false])
[6754 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004705d90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6755 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004705d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6756 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004705d90 principal evaluation fails
[6757 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004705d90 gate 1578074217500035500 evaluation fails
[6758 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6759 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[675a 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[675b 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[675c 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[675d 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[675e 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e690 gate 1578074217504581100 evaluation starts
[675f 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e690 signed by 0 principal evaluation starts (used [false])
[6760 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e690 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6761 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e690 principal evaluation succeeds for identity 0
[6762 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e690 gate 1578074217504581100 evaluation succeeds
[6763 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6764 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6765 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6766 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6767 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 7b 16 c6 e1 af cf 80 d2 7c 52 e8 65 54 de 22 |.{.......|R.eT."|
00000010 d1 5e 1f 74 78 e8 94 58 07 a1 ee 9b 97 ba 04 b2 |.^.tx..X........|
[6768 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 9d 7b 06 69 3d dd bb 4f 0c 3c 36 |0D. 9.{.i=..O.<6|
00000010 3e dd 66 92 b5 06 f4 15 c9 92 f2 dd eb 3d b0 0c |>.f..........=..|
00000020 16 14 d7 1f 02 20 56 39 85 7e 89 b0 57 55 32 d5 |..... V9.~..WU2.|
00000030 58 58 3a 00 46 35 83 83 de e7 84 62 d4 05 d6 18 |XX:.F5.....b....|
00000040 d1 70 6c 7d 29 ab |.pl}).|
[6769 01-03 17:56:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[676a 01-03 17:56:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[676b 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[676c 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[676d 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[676e 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[676f 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4259785098272709010 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[6770 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4259785098272709010 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[6771 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6772 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4259785098272709010 , Msg_type: BLOCK_MSG, digests: [1 3 4 2], Envelope: 45 bytes, Signature: 0 bytes
[6773 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4259785098272709010 , Msg_type: BLOCK_MSG, digests: [1 3 4 2], Envelope: 45 bytes, Signature: 0 bytes
[6774 01-03 17:56:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6775 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6776 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[6777 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[6778 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6779 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[677a 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 f8 0c 0a 24 25 7b 79 ca d6 bc 63 8e c0 27 57 |....$%{y...c..'W|
00000010 4f 24 4b 79 72 aa bc b6 c3 3f 10 68 d0 d9 9e 4b |O$Kyr....?.h...K|
[677b 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 5f 11 59 c9 22 00 15 8f ec 86 8a |0D. I_.Y."......|
00000010 6d 2e 9c 62 d6 c6 c9 f9 ae 7f 3f 33 ad 04 9f b7 |m..b......?3....|
00000020 d5 c1 db bd 02 20 50 03 75 ec 8c f8 a7 7e 34 77 |..... P.u....~4w|
00000030 71 62 e4 4b d1 71 38 21 bd 5e 60 f1 6c 4f 2f d9 |qb.K.q8!.^`.lO/.|
00000040 ea 04 22 e0 93 e9 |.."...|
[677c 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[677d 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004744290 gate 1578074217607240100 evaluation starts
[677e 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004744290 signed by 0 principal evaluation starts (used [false])
[677f 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004744290 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[6780 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004744290 principal evaluation succeeds for identity 0
[6781 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004744290 gate 1578074217607240100 evaluation succeeds
[6782 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[6783 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[6784 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[6785 01-03 17:56:57.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[6786 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [5] channel=businesschannel
[6787 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5]
[6788 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[6789 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [5] channel=businesschannel
[678a 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5734 bytes, seq: 5}, Envelope: 5764 bytes, Signature: 0 bytes to the block puller
[678b 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5
[678c 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]
[678d 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger
[678e 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer
[678f 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5]
[6790 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5]
[6791 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[6792 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003a43880 env 0xc0047324b0 txn 0
[6793 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0047324b0
[6794 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\347\200\276\360\005\020\370\323\326\361\001\"\017businesschannel*@cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\365\303\221\317/#\322\313}Z\337\022j\272\374\024\200\263\365\222\256\313\223("
[6795 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[6796 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[6797 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[6798 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[6799 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[679a 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 92 9c 63 4e 1c 82 6d 1f c0 9d 2d e4 46 bd 5d |3..cN..m...-.F.]|
00000010 06 62 16 aa 2d a8 ad c7 5e 32 0b 96 a7 a1 2c cd |.b..-...^2....,.|
[679b 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 1d bb 03 67 45 78 c3 53 5f 47 b5 |0D. ....gEx.S_G.|
00000010 fe 9b 04 f4 fd d0 4b 44 bc bc 74 94 f7 2e 73 63 |......KD..t...sc|
00000020 2f f5 4d 36 02 20 64 8e 27 58 0b 45 5c 33 98 46 |/.M6. d.'X.E\3.F|
00000030 94 2d ca 7b f0 7f 44 21 52 79 11 98 3a ac 32 38 |.-.{..D!Ry..:.28|
00000040 37 6d 50 8f d9 9e |7mP...|
[679c 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[679d 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004743000, header channel_header:"\010\003\032\014\010\347\200\276\360\005\020\370\323\326\361\001\"\017businesschannel*@cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\365\303\221\317/#\322\313}Z\337\022j\272\374\024\200\263\365\222\256\313\223("
[679e 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[679f 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[67a0 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[67a1 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[67a2 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67]
[67a3 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x61, 0x63, 0x61, 0x61, 0x36, 0x30, 0x38, 0x37, 0x30, 0x33, 0x34, 0x39, 0x64, 0x34, 0x35, 0x31, 0x38, 0x61, 0x37, 0x34, 0x39, 0x32, 0x66, 0x31, 0x64, 0x35, 0x62, 0x64, 0x38, 0x37, 0x63, 0x61, 0x37, 0x37, 0x63, 0x33, 0x65, 0x63, 0x66, 0x35, 0x38, 0x36, 0x65, 0x36, 0x34, 0x39, 0x63, 0x39, 0x62, 0x37, 0x66, 0x37, 0x31, 0x37, 0x35, 0x35, 0x36, 0x38, 0x34, 0x64, 0x64, 0x36, 0x37}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x61, 0x63, 0x61, 0x61, 0x36, 0x30, 0x38, 0x37, 0x30, 0x33, 0x34, 0x39, 0x64, 0x34, 0x35, 0x31, 0x38, 0x61, 0x37, 0x34, 0x39, 0x32, 0x66, 0x31, 0x64, 0x35, 0x62, 0x64, 0x38, 0x37, 0x63, 0x61, 0x37, 0x37, 0x63, 0x33, 0x65, 0x63, 0x66, 0x35, 0x38, 0x36, 0x65, 0x36, 0x34, 0x39, 0x63, 0x39, 0x62, 0x37, 0x66, 0x37, 0x31, 0x37, 0x35, 0x35, 0x36, 0x38, 0x34, 0x64, 0x64, 0x36, 0x37, 0xff}]
[67a4 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[67a5 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc00473e600
[67a6 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ba1bb9e0-f0cf-438f-ad27-e1b9a0a712cf]
[67a7 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ba1bb9e0-f0cf-438f-ad27-e1b9a0a712cf]
[67a8 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin
[67a9 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4c78418b-e163-4496-8554-9f9ce17774b1]
[67aa 01-03 17:56:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4c78418b-e163-4496-8554-9f9ce17774b1]
[67ab 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[67ac 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67ad 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67ae 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[67af 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement ==
[67b0 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67b1 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67b3 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67b4 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67b5 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5734 bytes, seq: 5}, Envelope: 5764 bytes, Signature: 0 bytes to 1 peers
[67b6 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67b2 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[67b7 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==
[67b8 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67b9 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5734 bytes, seq: 5}, Envelope: 5764 bytes, Signature: 0 bytes
[67ba 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[67bb 01-03 17:56:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 8a 36 52 8d 25 d5 f5 a5 e3 fe 70 2f 11 cf 37 |..6R.%.....p/..7|
00000010 87 25 f5 a1 e9 a8 cb 0d fb 57 52 27 21 66 46 4b |.%.......WR'!fFK|
[67bc 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c1 38 ca 4a e6 cc bc 4c 2a 83 4b |0D. 2.8.J...L*.K|
00000010 31 91 d4 d4 84 9b 0e 4e cb 40 60 d1 30 f5 bd d5 |1......N.@`.0...|
00000020 cf 5d 59 d0 02 20 3e 4c f1 c4 97 ac 36 a1 41 f7 |.]Y.. >L....6.A.|
00000030 d4 c2 f8 ba 44 41 24 68 e2 40 ac 64 18 ad 07 1b |....DA$h.@.d....|
00000040 d0 5c 5c 1a 28 aa |.\\.(.|
[67bd 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[67be 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 bb 16 44 43 12 f4 6f 4d 75 5b d7 36 11 64 0d |I..DC..oMu[.6.d.|
00000010 e4 d0 34 dd 25 6b f9 16 9c 93 48 47 58 8e 5b 43 |..4.%k....HGX.[C|
[67bf 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce dc 96 9d 55 f9 8c d0 62 19 a3 |0E.!.....U...b..|
00000010 10 70 06 56 4e 0c 22 76 c1 32 fd de a7 15 86 84 |.p.VN."v.2......|
00000020 1d e4 73 d4 5d 02 20 06 e1 fb 4d 56 2c f9 9b cc |..s.]. ...MV,...|
00000030 b0 1d 22 4d b2 52 a3 83 f3 1c 3e 78 71 dd 0f a7 |.."M.R....>xq...|
00000040 c6 32 d7 36 75 92 57 |.2.6u.W|
[67c0 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 1 validated
[67c1 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dea0 gate 1578074217634048600 evaluation starts
[67c2 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dea0 signed by 0 principal evaluation starts (used [false false])
[67c3 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dea0 processing identity 0 - &{Org1MSP 72d14a8ffb3355b2cd5ce4f5575706e3d93f82ccf34f87f37b6ede3c9fbcf9a5}
[67c4 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dea0 principal evaluation succeeds for identity 0
[67c5 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dea0 gate 1578074217634048600 evaluation succeeds
[67c6 01-03 17:56:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement
[67c7 01-03 17:56:57.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement
[67c8 01-03 17:56:57.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==
[67c9 01-03 17:56:57.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 8a 36 52 8d 25 d5 f5 a5 e3 fe 70 2f 11 cf 37 |..6R.%.....p/..7|
00000010 87 25 f5 a1 e9 a8 cb 0d fb 57 52 27 21 66 46 4b |.%.......WR'!fFK|
[67ca 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c1 38 ca 4a e6 cc bc 4c 2a 83 4b |0D. 2.8.J...L*.K|
00000010 31 91 d4 d4 84 9b 0e 4e cb 40 60 d1 30 f5 bd d5 |1......N.@`.0...|
00000020 cf 5d 59 d0 02 20 3e 4c f1 c4 97 ac 36 a1 41 f7 |.]Y.. >L....6.A.|
00000030 d4 c2 f8 ba 44 41 24 68 e2 40 ac 64 18 ad 07 1b |....DA$h.@.d....|
00000040 d0 5c 5c 1a 28 aa |.\\.(.|
[67cb 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[67cc 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 bb 16 44 43 12 f4 6f 4d 75 5b d7 36 11 64 0d |I..DC..oMu[.6.d.|
00000010 e4 d0 34 dd 25 6b f9 16 9c 93 48 47 58 8e 5b 43 |..4.%k....HGX.[C|
[67cd 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce dc 96 9d 55 f9 8c d0 62 19 a3 |0E.!.....U...b..|
00000010 10 70 06 56 4e 0c 22 76 c1 32 fd de a7 15 86 84 |.p.VN."v.2......|
00000020 1d e4 73 d4 5d 02 20 06 e1 fb 4d 56 2c f9 9b cc |..s.]. ...MV,...|
00000030 b0 1d 22 4d b2 52 a3 83 f3 1c 3e 78 71 dd 0f a7 |.."M.R....>xq...|
00000040 c6 32 d7 36 75 92 57 |.2.6u.W|
[67ce 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 1 validated
[67cf 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004792e20 gate 1578074217652066200 evaluation starts
[67d0 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004792e20 signed by 0 principal evaluation starts (used [false false])
[67d1 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004792e20 processing identity 0 - &{Org1MSP 72d14a8ffb3355b2cd5ce4f5575706e3d93f82ccf34f87f37b6ede3c9fbcf9a5}
[67d2 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004792e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[67d3 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004792e20 processing identity 1 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[67d4 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004792e20 principal evaluation succeeds for identity 1
[67d5 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004792e20 gate 1578074217652066200 evaluation succeeds
[67d6 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement
[67d7 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement
[67d8 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/LifecycleEndorsement
[67d9 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement
[67da 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5aeb45ad-fb55-45a7-a67e-155acca03443]
[67db 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5aeb45ad-fb55-45a7-a67e-155acca03443]
[67dc 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [e3a123fd-9888-4d92-af02-8965c823e6ec]
[67dd 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e3a123fd-9888-4d92-af02-8965c823e6ec]
[67de 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0d907be2-0e6f-465b-9583-93fa24b191db]
[67df 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0d907be2-0e6f-465b-9583-93fa24b191db]
[67e0 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1b8be8c8-030e-4c7c-86eb-59ae8be0e468]
[67e1 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1b8be8c8-030e-4c7c-86eb-59ae8be0e468]
[67e2 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: _lifecycle, tx 0 validation results is: <nil>
[67e3 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67 appears to be valid
[67e4 01-03 17:56:57.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc00473e600
[67e5 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[67e6 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 51ms
[67e7 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074214276854900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[67e8 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU HashedRWSet of tx [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67], namespace [_lifecycle], collection [_implicit_org_Org1MSP] doesn't contain writes
[67e9 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU HashedRWSet of tx [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67], namespace [_lifecycle], collection [_implicit_org_Org2MSP] doesn't contain writes
[67ea 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 67 d3 54 ad 84 28 a5 83 66 ab a4 41 cd c8 71 |.g.T..(..f..A..q|
00000010 f5 4c 18 10 4a 49 48 7e 98 92 f8 8f ee 83 5a b6 |.L..JIH~......Z.|
[67ed 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 3c c0 41 32 b6 f5 b9 2e 3e ad |0E.!..<.A2....>.|
00000010 27 e9 b6 df ff e1 77 1a 8b df 6e 98 39 ad 9f a4 |'.....w...n.9...|
00000020 ca b4 5a 12 6c 02 20 68 e3 6a 6c d0 c4 cb 39 29 |..Z.l. h.jl...9)|
00000030 1f 83 4a e1 69 d1 e9 da f3 79 41 08 3d 61 ce ff |..J.i....yA.=a..|
00000040 63 7b 3a 13 45 a7 50 |c{:.E.P|
[67eb 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[67ee 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[67ef 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[67f0 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [5] channel=businesschannel
[67f1 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5]
[67f2 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[67f3 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[67f4 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[67f5 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5]
[67f6 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[67f7 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[67f8 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[67f9 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[67fa 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[67fb 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[67fc 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[67fd 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[67fe 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[67ff 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6800 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6801 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6802 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[6803 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6804 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[6805 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6806 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67] marked as valid by state validator. ContainsPostOrderWrites [false]
[6807 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc00476eec0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc00476ef00), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc00476ef40), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc00476ef80), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc00476efc0)}
[6808 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[6809 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[680a 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[680b 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> INFO Updating cached definition for chaincode 'exp02' on channel 'businesschannel'
[680c 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[680d 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[680e 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[680f 01-03 17:56:57.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6810 01-03 17:56:57.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD> 01-03 17:56:57.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D> <09><0F>=<3D>Y\<03><>}<7D>J=<3D>M#d<>
[6812 01-03 17:56:57.67 UTC] [%{longpkg}] %{callpath} -> INFO Chaincode with package ID 'exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff' now available on channel businesschannel for chaincode definition exp02:1.0
[6813 01-03 17:56:57.67 UTC] [%{longpkg}] %{callpath} -> DEBU processApproveOrDefineEvent() channelID=businesschannel chaincodeName=exp02 cachedChaincode="{sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: () true 0xc002ec6a00 [\ufffd\ufffd\ufffd\ufffd>{\"+\ufffd\u0012\ufffd\ufffd#b\ufffd\u000b\u001f\ufffd\u0013\u0015\ufffdT\ufffdH\ufffd\ufffdW\u0005on\u0019\ufffd \ufffd\ufffd\ufffdh\ufffd-\ufffd\ufffd\ufffdi\ufffdu\ufffdE\ufffd\ufffd\ufffd\ufffd^\ufffd\u0006kꞐ\ufffd\ufffd\ufffd\ufffd\ufffd\u0013\ufffd \ufffd\ufffd\u001f\ufffdR\ufffd\ufffd\ufffd\u0018l\ufffd<k\ufffd\u0006\u000c\ufffdG4\u0015\ufffd\ufffd\u0017\ufffdψ\ufffd\ufffd\ufffd.ܿ \u00194SNrˤ\ufffd\ufffd\u0001s\ufffdp\ufffd\u0015\ufffd\ufffd\ufffdoy\ufffd\u0002\ufffd&\ufffd\ufffdt\ufffd\ufffdZM4 \ufffd\t\u001f\u0008\ufffd\u000f\ufffd=\ufffdY\\\u0003\ufffd\ufffd}\ufffdJ=\ufffdM\u001c#\u001cd\ufffd\r\ufffd\ufffd\ufffdԺ\ufffd]}"
[67ec 01-03 17:56:57.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003a43880 env 0xc0047324b0 txn 0
[6814 01-03 17:56:57.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6815 01-03 17:56:57.67 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[6816 01-03 17:56:57.67 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[6817 01-03 17:56:57.68 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff"
[6818 01-03 17:56:57.68 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[6819 01-03 17:56:57.69 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff error="No such container: dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff"
[681a 01-03 17:56:57.69 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[681b 01-03 17:56:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff error="No such container: dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff"
[681c 01-03 17:56:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052
[681d 01-03 17:56:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env:
CORE_CHAINCODE_ID_NAME=exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
CORE_CHAINCODE_LOGGING_LEVEL=info
CORE_CHAINCODE_LOGGING_SHIM=warn
CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}
CORE_PEER_TLS_ENABLED=true
CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key
CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt
CORE_TLS_CLIENT_KEY_FILE=/etc/hyperledger/fabric/client_pem.key
CORE_TLS_CLIENT_CERT_FILE=/etc/hyperledger/fabric/client_pem.crt
CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt
[681e 01-03 17:56:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff-909f98f3f6999083cb8988aca7f359042d80b8fb1e46d52baf63a30abd85b8de containerID=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[681f 01-03 17:56:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074214276854900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[6820 01-03 17:56:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074214276854900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[6821 01-03 17:56:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 67 d3 54 ad 84 28 a5 83 66 ab a4 41 cd c8 71 |.g.T..(..f..A..q|
00000010 f5 4c 18 10 4a 49 48 7e 98 92 f8 8f ee 83 5a b6 |.L..JIH~......Z.|
[6822 01-03 17:56:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 3c c0 41 32 b6 f5 b9 2e 3e ad |0E.!..<.A2....>.|
00000010 27 e9 b6 df ff e1 77 1a 8b df 6e 98 39 ad 9f a4 |'.....w...n.9...|
00000020 ca b4 5a 12 6c 02 20 68 e3 6a 6c d0 c4 cb 39 29 |..Z.l. h.jl...9)|
00000030 1f 83 4a e1 69 d1 e9 da f3 79 41 08 3d 61 ce ff |..J.i....yA.=a..|
00000040 63 7b 3a 13 45 a7 50 |c{:.E.P|
[6823 01-03 17:56:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6824 01-03 17:56:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6825 01-03 17:56:57.82 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff-909f98f3f6999083cb8988aca7f359042d80b8fb1e46d52baf63a30abd85b8de containerID=dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[6826 01-03 17:56:57.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11947662697453720401 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[6827 01-03 17:56:57.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11947662697453720401 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[6828 01-03 17:56:57.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[6829 01-03 17:56:57.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[682a 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[682b 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[682c 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[682d 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[682e 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[682f 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6830 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6831 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6832 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6833 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6834 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6835 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6836 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 c1 af e6 54 da 9a 67 d3 51 2b f8 d1 ee 32 8b |....T..g.Q+...2.|
00000010 e3 b8 c2 e0 4e 7f 86 a9 ed 5c 0c 08 ff e4 9a e8 |....N....\......|
[6837 01-03 17:56:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 2e bd e6 bf a4 fd 10 9b fc 82 |0E.!............|
00000010 b7 05 9f 56 1e 02 54 bc 84 8a 77 a1 fd ec 01 34 |...V..T...w....4|
00000020 ea 5e 72 c8 41 02 20 56 56 f7 05 b8 25 ea 7a f2 |.^r.A. VV...%.z.|
00000030 a4 18 b6 7b 18 0e 6f a6 2c e0 d9 ef 6b b6 f9 67 |...{..o.,...k..g|
00000040 60 77 a3 68 22 22 bf |`w.h"".|
[6838 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6839 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415630 gate 1578074217990059700 evaluation starts
[683a 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415630 signed by 0 principal evaluation starts (used [false])
[683b 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415630 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[683c 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[683d 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415630 principal evaluation fails
[683e 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415630 gate 1578074217990059700 evaluation fails
[683f 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6840 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6841 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6842 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 c1 af e6 54 da 9a 67 d3 51 2b f8 d1 ee 32 8b |....T..g.Q+...2.|
00000010 e3 b8 c2 e0 4e 7f 86 a9 ed 5c 0c 08 ff e4 9a e8 |....N....\......|
[6843 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 2e bd e6 bf a4 fd 10 9b fc 82 |0E.!............|
00000010 b7 05 9f 56 1e 02 54 bc 84 8a 77 a1 fd ec 01 34 |...V..T...w....4|
00000020 ea 5e 72 c8 41 02 20 56 56 f7 05 b8 25 ea 7a f2 |.^r.A. VV...%.z.|
00000030 a4 18 b6 7b 18 0e 6f a6 2c e0 d9 ef 6b b6 f9 67 |...{..o.,...k..g|
00000040 60 77 a3 68 22 22 bf |`w.h"".|
[6844 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6845 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415f30 gate 1578074217990590700 evaluation starts
[6846 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415f30 signed by 0 principal evaluation starts (used [false])
[6847 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415f30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6848 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415f30 principal evaluation succeeds for identity 0
[6849 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005415f30 gate 1578074217990590700 evaluation succeeds
[684a 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[684b 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[684c 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[684d 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[684e 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[684f 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes]}
[6850 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76
[6851 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76
[6852 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6853 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6854 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6855 01-03 17:56:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6856 01-03 17:56:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6857 01-03 17:56:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6858 01-03 17:56:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6859 01-03 17:56:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[685a 01-03 17:56:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[685b 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[685c 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[685d 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[685e 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[685f 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6860 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6861 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6862 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6863 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6864 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6865 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6866 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6867 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6868 01-03 17:56:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6869 01-03 17:56:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[686a 01-03 17:56:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[686b 01-03 17:56:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[686c 01-03 17:56:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[686d 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[686e 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[686f 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6870 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[6871 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6872 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6873 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6874 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6875 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6876 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6877 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6878 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6879 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 dc 0a 7a ed 7d d4 8d 09 47 b0 de fd 23 b2 8c |...z.}...G...#..|
00000010 23 fe c8 a8 1a 1b af cc 13 a0 7e ed f5 d0 c1 37 |#.........~....7|
[687a 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 1d d2 27 1e 75 d3 15 49 3c 48 |0E.!....'.u..I<H|
00000010 fb 9f 12 84 1b f2 95 e7 2d 37 96 13 d0 ed 6d 66 |........-7....mf|
00000020 49 e9 ea c6 25 02 20 2c a3 19 41 9d e9 2d 94 4f |I...%. ,..A..-.O|
00000030 ea cb b3 86 f4 ee ee 0c 69 ab 2f c0 38 7d d8 08 |........i./.8}..|
00000040 3f 93 2c f4 3c c8 ac |?.,.<..|
[687b 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[687c 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcc0 gate 1578074218073393800 evaluation starts
[687d 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcc0 signed by 0 principal evaluation starts (used [false])
[687e 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[687f 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6880 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcc0 principal evaluation fails
[6881 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcc0 gate 1578074218073393800 evaluation fails
[6882 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6883 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6884 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6885 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 dc 0a 7a ed 7d d4 8d 09 47 b0 de fd 23 b2 8c |...z.}...G...#..|
00000010 23 fe c8 a8 1a 1b af cc 13 a0 7e ed f5 d0 c1 37 |#.........~....7|
[6886 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 1d d2 27 1e 75 d3 15 49 3c 48 |0E.!....'.u..I<H|
00000010 fb 9f 12 84 1b f2 95 e7 2d 37 96 13 d0 ed 6d 66 |........-7....mf|
00000020 49 e9 ea c6 25 02 20 2c a3 19 41 9d e9 2d 94 4f |I...%. ,..A..-.O|
00000030 ea cb b3 86 f4 ee ee 0c 69 ab 2f c0 38 7d d8 08 |........i./.8}..|
00000040 3f 93 2c f4 3c c8 ac |?.,.<..|
[6887 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6888 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039605c0 gate 1578074218074279000 evaluation starts
[6889 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039605c0 signed by 0 principal evaluation starts (used [false])
[688a 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039605c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[688b 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039605c0 principal evaluation succeeds for identity 0
[688c 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039605c0 gate 1578074218074279000 evaluation succeeds
[688d 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[688e 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[688f 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6890 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6891 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[6892 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes]}
[6893 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78
[6894 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78
[6895 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6896 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6897 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6898 01-03 17:56:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6899 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[689a 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[689b 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[689c 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[689d 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[689e 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[689f 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68a0 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[68a1 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68a2 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[68a3 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[68a4 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68a5 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[68a6 01-03 17:56:58.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68a7 01-03 17:56:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[68a8 01-03 17:56:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[68a9 01-03 17:56:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68aa 01-03 17:56:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[68ab 01-03 17:56:58.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68ac 01-03 17:56:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[68ad 01-03 17:56:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[68ae 01-03 17:56:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68af 01-03 17:56:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68b0 01-03 17:56:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68b1 01-03 17:56:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68b2 01-03 17:56:58.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[68b3 01-03 17:56:58.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68b4 01-03 17:56:58.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes
[68b5 01-03 17:56:58.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68b6 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315104B
[68b7 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4E723B9A180A537F8B1EE1A9F175E60C77FF764566858EBE25280C5E6886A9B0
[68b8 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[68b9 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[68ba 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[68bb 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68bc 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68bd 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[68be 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68bf 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[68c0 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68c1 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[68c2 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes
[68c3 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68c4 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[68c5 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68c6 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes
[68c7 01-03 17:56:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68c8 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074214221661800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[68c9 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074214221661800 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes
[68ca 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68cb 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[68cc 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[68cd 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[68ce 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[68cf 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[68d0 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[68d1 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[68d2 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[68d3 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[68d4 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375db80 gate 1578074218299632900 evaluation starts
[68d5 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375db80 signed by 0 principal evaluation starts (used [false])
[68d6 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375db80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[68d7 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375db80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[68d8 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375db80 principal evaluation fails
[68d9 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375db80 gate 1578074218299632900 evaluation fails
[68da 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[68db 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[68dc 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[68dd 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[68de 01-03 17:56:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[68df 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[68e0 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746730 gate 1578074218300091100 evaluation starts
[68e1 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746730 signed by 0 principal evaluation starts (used [false])
[68e2 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746730 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[68e3 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746730 principal evaluation succeeds for identity 0
[68e4 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746730 gate 1578074218300091100 evaluation succeeds
[68e5 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[68e6 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[68e7 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[68e8 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[68e9 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68ea 01-03 17:56:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68eb 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes
[68ec 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes
[68ed 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68ee 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes
[68ef 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[68f0 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e 72 3b 9a 18 0a 53 7f 8b 1e e1 a9 f1 75 e6 0c |Nr;...S......u..|
00000010 77 ff 76 45 66 85 8e be 25 28 0c 5e 68 86 a9 b0 |w.vEf...%(.^h...|
[68f1 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf bb 5c 1a 9c d0 39 2b c4 9a 71 |0E.!...\...9+..q|
00000010 86 d1 92 5e 99 40 bc b1 fc c4 bc c7 80 4a 68 1d |...^.@.......Jh.|
00000020 da eb be 1c f4 02 20 72 fe ab 43 06 19 a3 26 23 |...... r..C...&#|
00000030 7c a0 14 bf 21 9e ab 61 4e 81 33 9e 53 86 b5 5a ||...!..aN.3.S..Z|
00000040 e7 c5 3b 4d ea ad ae |..;M...|
[68f2 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:75 , Envelope: 83 bytes, Signature: 71 bytes
[68f3 01-03 17:56:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68f4 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar
[68f5 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6A121408908FF491D1C09CF315...2A0E08051A0A0A056578703032120131
[68f6 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C1AB3B29EFE813A1115F639995448C69605AAEE4E174C9E6A6F860BDDF6E504E
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>:exp02 <20><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ:exp02 <20><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>:exp02]})] %!s(*lifecycle.Resources=&{0xc00031a4e0 0xc0003382e0 0xc000334b20 0xc0000100d0}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[<5B>;<3B>A<EFBFBD><41><EFBFBD><EFBFBD>TU FEX<45><58>ղ<><D5B2><EFBFBD>I‹<49>\<5C>.(<28>:%!s(*lifecycle.LocalChaincode=&{0xc002ec6a00 map[businesschannel:map[exp02:0xc0047bb710]]})] %!s(*lifecycle.EventBroker=&{0xc0003382e0 0xc0002d7ee0 0xc000334b20 0xc0002df740 {0 0} map[]}) %!s(*lifecycle.MetadataManager=&{{0 0} [0x15f73f0] map[businesschannel:[]] map[businesschannel:[{exp02 1 [10 40 18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [] 0xc00476f240 true true}]]}) %!s(*lifecycle.ChaincodeCustodian=&{0xc000438640 {0 0} [] false})}
[68f8 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0054921e0), (*kvrwset.KVWrite)(0xc005492230), (*kvrwset.KVWrite)(0xc005492280), (*kvrwset.KVWrite)(0xc0054922d0), (*kvrwset.KVWrite)(0xc005492320)}}
[68f9 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02]
[68fa 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]
[68fb 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88})}
[68fc 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[68fd 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[68fe 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 181 188 186 246 204 200 82 24 163 18 115 169 243 165 172 145 130 171 21 5 18 41 65 247 176 146 208 82 173 105 156 166 2 32 11 83 173 30 184 150 36 95 0 210 3 48 155 20 156 229 137 3 95 230 99 168 92 201 143 203 217 20 86 75 192 120]} 0x15f7150}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc000267380 0xc000123a40 {{0 0} 0 0 0 0} {false}})]}
[68ff 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000438600 0x2668b88}) %!s(*confighistory.dbProvider=&{0xc00087ac00})}
[6900 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5]
[6901 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage
[6902 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store
[6903 01-03 17:56:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5]
[6904 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5]
[6905 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0xdc, 0xc1, 0x4, 0xf3, 0xd3, 0x56, 0x59, 0x61, 0xe6, 0xd7, 0xb6, 0x6e, 0xb8, 0x70, 0xc3, 0x9b, 0x4, 0x57, 0xb4, 0xf0, 0x8d, 0x97, 0x51, 0x23, 0xf6, 0xa, 0x7e, 0x2b, 0x3e, 0x7e, 0x97, 0xfb} txOffsets=
txId=cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67 locPointer=offset=70, bytesLength=4725
]
[6906 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81047, bytesLength=4725] for tx ID: [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67] to txid-index
[6907 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=81047, bytesLength=4725] for tx number:[0] ID: [cacaa60870349d4518a7492f1d5bd87ca77c3ecf586e649c9b7f71755684dd67] to blockNumTranNum index
[6908 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[6909 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[690a 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[690b 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[690c 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[690d 01-03 17:56:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[690e 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86733], isChainEmpty=[false], lastBlockNumber=[5]
[690f 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Came out of wait. maxAvailaBlockNumber=[5]
[6910 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[5756], Going to peek [8] bytes
[6911 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[5754], placementInfo={fileNum=[0], startOffset=[80977], bytesOffset=[80979]}
[6912 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU blockbytes [5754] read from file [0]
[6913 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database
[6914 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[6915 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[6916 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[6917 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[6918 01-03 17:56:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]
[6919 01-03 17:56:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]
[691a 01-03 17:56:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]
[691b 01-03 17:56:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]
[691c 01-03 17:56:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]
[691d 01-03 17:56:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[691e 01-03 17:56:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6]
[691f 01-03 17:56:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[6920 01-03 17:56:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database
[6921 01-03 17:56:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions
[6922 01-03 17:56:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5]
[6923 01-03 17:56:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]
[6924 01-03 17:56:58.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 746ms (state_validation=692ms block_and_pvtdata_commit=23ms state_commit=22ms) commitHash=[6acca058dcff1d3f39afba7f0f46fcb91cc8e971bdf01b1e14bb48c649f3db22]
[6925 01-03 17:56:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6]
[6926 01-03 17:56:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Delivering block [5] for (0xc0044c4580) for 172.18.0.9:57566
[6927 01-03 17:56:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]
[6928 01-03 17:56:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6A121408908FF491D1C09CF315...2A0E08061A0A0A056578703032120131
[6929 01-03 17:56:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 65C8E9E0ED143A3DA5B5EE385D08D078BAF29FCDC032C045A098A3010D7788D0
[692a 01-03 17:56:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s)
[692b 01-03 17:56:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[692c 01-03 17:56:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Context canceled, aborting wait for next block
[692d 01-03 17:56:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Closing Deliver stream
[692e 01-03 17:56:58.59 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2020-01-03T17:57:25.574Z grpc.peer_address=172.18.0.9:57566 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=3.020607s
[692f 01-03 17:56:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Came out of wait. maxAvailaBlockNumber=[5]
[6930 01-03 17:56:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6931 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57574
[6932 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU 662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[6933 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU 662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73 creator is valid
[6934 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 3a 45 60 10 50 5b 3e 53 33 50 5b 26 6a 92 61 |.:E`.P[>S3P[&j.a|
00000010 81 b8 bd 0f a7 24 8f dd 12 91 98 93 11 45 ff 15 |.....$.......E..|
[6935 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 63 c4 1f 3c ff a4 64 2a b7 ba aa |0D. ]c..<..d*...|
00000010 25 04 e8 69 dc 30 09 e1 c3 04 43 50 f9 fb ce 18 |%..i.0....CP....|
00000020 59 1c 90 2a 02 20 37 c7 fc 7e 32 8a f1 89 aa e1 |Y..*. 7..~2.....|
00000030 98 ac 38 b0 f5 7e 0d a3 10 52 4e 6f 62 e6 25 eb |..8..~...RNob.%.|
00000040 e4 4c 11 a6 39 3c |.L..9<|
[6936 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU 662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73 signature is valid
[6937 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][66267484] processing txid: 662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73
[6938 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73]
[6939 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x36, 0x36, 0x32, 0x36, 0x37, 0x34, 0x38, 0x34, 0x35, 0x34, 0x37, 0x39, 0x63, 0x35, 0x34, 0x63, 0x33, 0x38, 0x32, 0x35, 0x37, 0x65, 0x63, 0x63, 0x38, 0x35, 0x61, 0x32, 0x65, 0x39, 0x32, 0x61, 0x31, 0x31, 0x39, 0x36, 0x63, 0x63, 0x30, 0x66, 0x37, 0x33, 0x32, 0x65, 0x32, 0x32, 0x64, 0x38, 0x39, 0x31, 0x38, 0x37, 0x38, 0x32, 0x36, 0x30, 0x35, 0x62, 0x66, 0x37, 0x62, 0x66, 0x37, 0x33}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x36, 0x36, 0x32, 0x36, 0x37, 0x34, 0x38, 0x34, 0x35, 0x34, 0x37, 0x39, 0x63, 0x35, 0x34, 0x63, 0x33, 0x38, 0x32, 0x35, 0x37, 0x65, 0x63, 0x63, 0x38, 0x35, 0x61, 0x32, 0x65, 0x39, 0x32, 0x61, 0x31, 0x31, 0x39, 0x36, 0x63, 0x63, 0x30, 0x66, 0x37, 0x33, 0x32, 0x65, 0x32, 0x32, 0x64, 0x38, 0x39, 0x31, 0x38, 0x37, 0x38, 0x32, 0x36, 0x30, 0x35, 0x62, 0x66, 0x37, 0x62, 0x66, 0x37, 0x33, 0xff}]
[693a 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[693b 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73]
[693c 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][66267484] Entry chaincode: _lifecycle
[693d 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][66267484] Entry chaincode: _lifecycle
[693e 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting chaincode data for _lifecycle on channel businesschannel
[693f 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[6940 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition
[6941 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[6942 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6943 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6944 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6945 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 3a 45 60 10 50 5b 3e 53 33 50 5b 26 6a 92 61 |.:E`.P[>S3P[&j.a|
00000010 81 b8 bd 0f a7 24 8f dd 12 91 98 93 11 45 ff 15 |.....$.......E..|
[6946 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 63 c4 1f 3c ff a4 64 2a b7 ba aa |0D. ]c..<..d*...|
00000010 25 04 e8 69 dc 30 09 e1 c3 04 43 50 f9 fb ce 18 |%..i.0....CP....|
00000020 59 1c 90 2a 02 20 37 c7 fc 7e 32 8a f1 89 aa e1 |Y..*. 7..~2.....|
00000030 98 ac 38 b0 f5 7e 0d a3 10 52 4e 6f 62 e6 25 eb |..8..~...RNob.%.|
00000040 e4 4c 11 a6 39 3c |.L..9<|
[6947 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6948 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362eec0 gate 1578074219411445900 evaluation starts
[6949 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362eec0 signed by 0 principal evaluation starts (used [false])
[694a 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362eec0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[694b 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362eec0 principal evaluation succeeds for identity 0
[694c 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362eec0 gate 1578074219411445900 evaluation succeeds
[694d 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[694e 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[694f 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6950 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6951 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'
[6952 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6953 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_STATE from chaincode
[6954 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel
[6955 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[6956 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_STATE. Sending RESPONSE
[6957 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6958 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_STATE from chaincode
[6959 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel
[695a 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[695b 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_STATE. Sending RESPONSE
[695c 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[695d 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_STATE from chaincode
[695e 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel
[695f 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo
[6960 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_STATE. Sending RESPONSE
[6961 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6962 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_STATE from chaincode
[6963 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel
[6964 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo
[6965 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_STATE. Sending RESPONSE
[6966 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6967 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_STATE from chaincode
[6968 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel
[6969 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections
[696a 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_STATE. Sending RESPONSE
[696b 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> INFO successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'
[696c 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[696d 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_PRIVATE_DATA_HASH from chaincode
[696e 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[696f 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[6970 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > > > ]
[6971 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6972 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6973 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6974 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_PRIVATE_DATA_HASH from chaincode
[6975 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[6976 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6977 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6978 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6979 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_PRIVATE_DATA_HASH from chaincode
[697a 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[697b 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[697c 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[697d 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[697e 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_PRIVATE_DATA_HASH from chaincode
[697f 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[6980 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6981 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6982 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6983 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_PRIVATE_DATA_HASH from chaincode
[6984 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[6985 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6986 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6987 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6988 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_PRIVATE_DATA_HASH from chaincode
[6989 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[698a 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[698b 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[698c 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[698d 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_PRIVATE_DATA_HASH from chaincode
[698e 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[698f 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[6990 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6991 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6992 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] handling GET_PRIVATE_DATA_HASH from chaincode
[6993 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[6994 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6995 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6996 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[6997 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [66267484] notifying Txid:662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73, channelID:businesschannel
[6998 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6999 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][66267484] Exit chaincode: _lifecycle (6ms)
[699a 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[699b 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73]
[699c 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][66267484] Exit
[699d 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][66267484] escc for chaincode _lifecycle is escc
[699e 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F02EAF64F2F89953CDF1911B3F44...455254494649434154452D2D2D2D2D0A
[699f 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A923546D9B1843CDD3A9ED11CF0B005D4B9AF64C59EEBF6034E582D3A96B4904
[69a0 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [662674845479c54c38257ecc85a2e92a1196cc0f732e22d8918782605bf7bf73]
[69a1 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57574
[69a2 01-03 17:56:59.41 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57574 grpc.code=OK grpc.call_duration=7.2211ms
[69a3 01-03 17:56:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[69a4 01-03 17:56:59.42 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[69a5 01-03 17:56:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:17670534184772580384 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[69a6 01-03 17:56:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17670534184772580384 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[69a7 01-03 17:56:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[69a8 01-03 17:56:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[69a9 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[69aa 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[69ab 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[69ac 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[69ad 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 23 c1 fa 59 c7 2e 8a f2 2a 34 90 34 11 f9 36 |.#..Y....*4.4..6|
00000010 df f9 f0 5a 9d f3 19 98 8f de 8f b6 25 c0 8a 11 |...Z........%...|
[69ae 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 31 d2 d6 f3 c2 da 66 f3 ff bc |0E.!..1.....f...|
00000010 00 57 08 02 c3 17 e9 b2 76 63 63 3a 6d 2c 0d 58 |.W......vcc:m,.X|
00000020 cf 19 4d 1f 8b 02 20 0d 93 60 27 68 b9 6f a2 ae |..M... ..`'h.o..|
00000030 a2 4f 32 4e b3 ee 19 5a 9c 2a fd 8a db 52 74 3f |.O2N...Z.*...Rt?|
00000040 9f f5 44 d4 0d fe ff |..D....|
[69af 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[69b0 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 9d e9 08 49 b7 19 ae 29 f6 1d 01 |0D. ;...I...)...|
00000010 46 a3 14 80 75 5a 95 91 ad d7 95 25 ee a6 59 a9 |F...uZ.....%..Y.|
00000020 5d 36 d6 8a 02 20 72 aa 47 9d b2 bb e8 fb 2a 6d |]6... r.G.....*m|
00000030 f7 b5 01 6e 45 b5 25 8e 86 b6 37 32 54 f8 f4 52 |...nE.%...72T..R|
00000040 3a 51 02 95 94 2c |:Q...,|
[69b1 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[69b2 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[69b3 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79
[69b4 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79
[69b5 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:78 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[69b6 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[69b7 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[69b8 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[69b9 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[69ba 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[69bb 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[69bc 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[69bd 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[69be 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[69bf 01-03 17:56:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[69c0 01-03 17:57:00.06 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[69c1 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff 's authentication is authorized
[69c2 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[69c3 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[69c4 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[69c5 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff, sending back REGISTERED
[69c6 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[69c7 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[69c8 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode exp02:8f7e5da3122ccb2f357eabff47dcac33d304a3637f9df721cbd90ec8cd6bbaff
[69c9 01-03 17:57:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete
[69ca 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57588
[69cb 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[69cc 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea creator is valid
[69cd 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 1f 7a d4 ff 97 30 b0 ad 61 4d 82 13 8a af 02 |..z...0..aM.....|
00000010 86 44 a3 35 41 89 a0 0b 6a 38 9f cd bc 49 4f be |.D.5A...j8...IO.|
[69ce 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 48 e3 c2 88 91 79 fd 73 d1 fd |0E.!..H....y.s..|
00000010 ef 6e 5f 5f 92 7b 1c cf a5 89 00 1a 28 d7 7b ff |.n__.{......(.{.|
00000020 e0 e5 82 03 dc 02 20 2c 8e 07 48 fe f6 ee 49 18 |...... ,..H...I.|
00000030 92 51 75 3b ec ae ff 6a 58 f1 e1 3f ee 90 61 30 |.Qu;...jX..?..a0|
00000040 23 15 06 b1 b2 eb 41 |#.....A|
[69cf 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea signature is valid
[69d0 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4dd638d8] processing txid: 4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea
[69d1 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea]
[69d2 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x34, 0x64, 0x64, 0x36, 0x33, 0x38, 0x64, 0x38, 0x31, 0x31, 0x65, 0x38, 0x37, 0x39, 0x35, 0x35, 0x63, 0x33, 0x34, 0x38, 0x64, 0x36, 0x35, 0x36, 0x34, 0x34, 0x62, 0x61, 0x34, 0x36, 0x33, 0x33, 0x34, 0x36, 0x37, 0x30, 0x62, 0x36, 0x62, 0x35, 0x61, 0x37, 0x32, 0x61, 0x38, 0x65, 0x32, 0x32, 0x39, 0x61, 0x64, 0x35, 0x31, 0x30, 0x34, 0x38, 0x63, 0x36, 0x37, 0x63, 0x31, 0x36, 0x65, 0x61}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x34, 0x64, 0x64, 0x36, 0x33, 0x38, 0x64, 0x38, 0x31, 0x31, 0x65, 0x38, 0x37, 0x39, 0x35, 0x35, 0x63, 0x33, 0x34, 0x38, 0x64, 0x36, 0x35, 0x36, 0x34, 0x34, 0x62, 0x61, 0x34, 0x36, 0x33, 0x33, 0x34, 0x36, 0x37, 0x30, 0x62, 0x36, 0x62, 0x35, 0x61, 0x37, 0x32, 0x61, 0x38, 0x65, 0x32, 0x32, 0x39, 0x61, 0x64, 0x35, 0x31, 0x30, 0x34, 0x38, 0x63, 0x36, 0x37, 0x63, 0x31, 0x36, 0x65, 0x61, 0xff}]
[69d3 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[69d4 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[69d5 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[69d6 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[69d7 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[69d8 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 1f 7a d4 ff 97 30 b0 ad 61 4d 82 13 8a af 02 |..z...0..aM.....|
00000010 86 44 a3 35 41 89 a0 0b 6a 38 9f cd bc 49 4f be |.D.5A...j8...IO.|
[69d9 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 48 e3 c2 88 91 79 fd 73 d1 fd |0E.!..H....y.s..|
00000010 ef 6e 5f 5f 92 7b 1c cf a5 89 00 1a 28 d7 7b ff |.n__.{......(.{.|
00000020 e0 e5 82 03 dc 02 20 2c 8e 07 48 fe f6 ee 49 18 |...... ,..H...I.|
00000030 92 51 75 3b ec ae ff 6a 58 f1 e1 3f ee 90 61 30 |.Qu;...jX..?..a0|
00000040 23 15 06 b1 b2 eb 41 |#.....A|
[69da 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[69db 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e170 gate 1578074220459889200 evaluation starts
[69dc 01-03 17:57:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e170 signed by 0 principal evaluation starts (used [false])
[69dd 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e170 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[69de 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e170 principal evaluation succeeds for identity 0
[69df 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335e170 gate 1578074220459889200 evaluation succeeds
[69e0 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[69e1 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[69e2 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[69e3 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[69e4 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[69e5 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea]
[69e6 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[69e7 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4dd638d8] Entry chaincode: exp02
[69e8 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4dd638d8] Entry chaincode: exp02
[69e9 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] getting chaincode data for exp02 on channel businesschannel
[69ea 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[69eb 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[69ec 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[69ed 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[69ee 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] handling PUT_STATE from chaincode
[69ef 01-03 17:57:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] Completed PUT_STATE. Sending RESPONSE
[69f0 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[69f1 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] handling PUT_STATE from chaincode
[69f2 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] Completed PUT_STATE. Sending RESPONSE
[69f3 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[69f4 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4dd638d8] notifying Txid:4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea, channelID:businesschannel
[69f5 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[69f6 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4dd638d8] Exit chaincode: exp02 (9ms)
[69f7 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[69f8 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea]
[69f9 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4dd638d8] Exit
[69fa 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4dd638d8] escc for chaincode exp02 is escc
[69fb 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20E7E6B4CC4F46C7D8E993781F70F8...455254494649434154452D2D2D2D2D0A
[69fc 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DC6A6A18F256AEB66A43C59AF397EDA0B0D71BF9A98AA2AD8E7529D1329D0191
[69fd 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea]
[69fe 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57588
[69ff 01-03 17:57:00.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57588 grpc.code=OK grpc.call_duration=22.7912ms
[6a00 01-03 17:57:00.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6a01 01-03 17:57:00.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6a02 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:11617429445369387327 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a03 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:11617429445369387327 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a04 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11617429445369387327 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a05 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a06 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a07 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a08 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a09 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a0a 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a0b 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[6a0c 01-03 17:57:01.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a0d 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:11964993529486123661 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a0e 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:11964993529486123661 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a0f 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11964993529486123661 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a10 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a11 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a12 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a13 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a14 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a15 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a16 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[6a17 01-03 17:57:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a18 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6a19 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6a1a 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a1b 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6a1c 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6a1d 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a1e 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6a1f 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6a20 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6a21 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6a22 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6a23 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6a24 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 40 24 73 63 f5 02 71 e7 89 8c f4 8b 93 94 02 |.@$sc..q........|
00000010 36 51 d7 93 68 ab 00 1a 2b b2 af b1 ca 77 34 8f |6Q..h...+....w4.|
[6a25 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 48 80 50 6f 20 a5 da 6f d3 5d 21 |0D. IH.Po ..o.]!|
00000010 c6 2d 28 78 0b 4e fc 5c 8c 07 80 e4 d2 0a 09 d8 |.-(x.N.\........|
00000020 44 bb 14 dc 02 20 4e 71 a2 1b 56 f8 c5 6e b0 ef |D.... Nq..V..n..|
00000030 f3 bf 47 0e 5b 85 b7 6e 15 9f 65 5d fa 65 32 09 |..G.[..n..e].e2.|
00000040 eb 27 62 56 f2 3d |.'bV.=|
[6a26 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6a27 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328aa10 gate 1578074221152739500 evaluation starts
[6a28 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328aa10 signed by 0 principal evaluation starts (used [false])
[6a29 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328aa10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6a2a 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328aa10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6a2b 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328aa10 principal evaluation fails
[6a2c 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328aa10 gate 1578074221152739500 evaluation fails
[6a2d 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6a2e 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6a2f 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6a30 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 40 24 73 63 f5 02 71 e7 89 8c f4 8b 93 94 02 |.@$sc..q........|
00000010 36 51 d7 93 68 ab 00 1a 2b b2 af b1 ca 77 34 8f |6Q..h...+....w4.|
[6a31 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 48 80 50 6f 20 a5 da 6f d3 5d 21 |0D. IH.Po ..o.]!|
00000010 c6 2d 28 78 0b 4e fc 5c 8c 07 80 e4 d2 0a 09 d8 |.-(x.N.\........|
00000020 44 bb 14 dc 02 20 4e 71 a2 1b 56 f8 c5 6e b0 ef |D.... Nq..V..n..|
00000030 f3 bf 47 0e 5b 85 b7 6e 15 9f 65 5d fa 65 32 09 |..G.[..n..e].e2.|
00000040 eb 27 62 56 f2 3d |.'bV.=|
[6a32 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6a33 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b310 gate 1578074221153377200 evaluation starts
[6a34 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b310 signed by 0 principal evaluation starts (used [false])
[6a35 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b310 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6a36 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b310 principal evaluation succeeds for identity 0
[6a37 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b310 gate 1578074221153377200 evaluation succeeds
[6a38 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6a39 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6a3a 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6a3b 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6a3c 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[6a3d 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes]}
[6a3e 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79
[6a3f 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79
[6a40 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:78 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[6a41 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a42 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a43 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a44 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[6a45 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a46 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a47 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a48 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[6a49 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6a4a 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[6a4b 01-03 17:57:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a4c 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6a4d 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6a4e 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a4f 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6a50 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[6a51 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a52 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6a53 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6a54 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6a55 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6a56 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6a57 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6a58 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 77 12 2a 64 1d 5e ad 06 f0 fc 9b 59 b7 88 7d |.w.*d.^.....Y..}|
00000010 06 38 c1 b1 59 28 76 2a 4e cf 04 d4 0e 12 72 37 |.8..Y(v*N.....r7|
[6a59 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 9f de 1e 3d a6 fc 34 f1 f3 22 |0E.!.....=..4.."|
00000010 74 7b 69 3a a4 85 9e 90 71 88 c2 b7 08 af 43 15 |t{i:....q.....C.|
00000020 83 28 12 94 03 02 20 11 00 97 c5 9b ac 75 73 77 |.(.... ......usw|
00000030 87 0e b8 63 b9 0e 8f 2c 97 e0 9e 5e 94 9c f4 ff |...c...,...^....|
00000040 d0 4b d0 fa 40 f3 66 |.K..@.f|
[6a5a 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6a5b 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032915b0 gate 1578074221183708800 evaluation starts
[6a5c 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032915b0 signed by 0 principal evaluation starts (used [false])
[6a5d 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032915b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6a5e 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032915b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6a5f 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032915b0 principal evaluation fails
[6a60 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032915b0 gate 1578074221183708800 evaluation fails
[6a61 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6a62 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6a63 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6a64 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 77 12 2a 64 1d 5e ad 06 f0 fc 9b 59 b7 88 7d |.w.*d.^.....Y..}|
00000010 06 38 c1 b1 59 28 76 2a 4e cf 04 d4 0e 12 72 37 |.8..Y(v*N.....r7|
[6a65 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 9f de 1e 3d a6 fc 34 f1 f3 22 |0E.!.....=..4.."|
00000010 74 7b 69 3a a4 85 9e 90 71 88 c2 b7 08 af 43 15 |t{i:....q.....C.|
00000020 83 28 12 94 03 02 20 11 00 97 c5 9b ac 75 73 77 |.(.... ......usw|
00000030 87 0e b8 63 b9 0e 8f 2c 97 e0 9e 5e 94 9c f4 ff |...c...,...^....|
00000040 d0 4b d0 fa 40 f3 66 |.K..@.f|
[6a66 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6a67 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291eb0 gate 1578074221186183000 evaluation starts
[6a68 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291eb0 signed by 0 principal evaluation starts (used [false])
[6a69 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291eb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6a6a 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291eb0 principal evaluation succeeds for identity 0
[6a6b 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291eb0 gate 1578074221186183000 evaluation succeeds
[6a6c 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6a6d 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6a6e 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6a6f 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6a70 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes
[6a71 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes]}
[6a72 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77
[6a73 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77
[6a74 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[6a75 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a76 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a77 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a78 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[6a79 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a7a 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a7b 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a7c 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[6a7d 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6a7e 01-03 17:57:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[6a7f 01-03 17:57:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a80 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[6a81 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:18231712162997336952 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6a82 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[6a83 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:18231712162997336952 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a84 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a85 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2479575261832468511 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[6a86 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[6a87 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2479575261832468511 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6a88 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a89 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4737530176177981650 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[6a8a 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4737530176177981650 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6a8b 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a8c 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2479575261832468511 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[6a8d 01-03 17:57:01.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2479575261832468511 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes
[6a8e 01-03 17:57:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a8f 01-03 17:57:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4737530176177981650 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[6a90 01-03 17:57:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4737530176177981650 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[6a91 01-03 17:57:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4737530176177981650 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[6a92 01-03 17:57:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a93 01-03 17:57:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18231712162997336952 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[6a94 01-03 17:57:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18231712162997336952 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[6a95 01-03 17:57:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18231712162997336952 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[6a96 01-03 17:57:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a97 01-03 17:57:01.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a99 01-03 17:57:01.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a9a 01-03 17:57:01.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[6a9b 01-03 17:57:01.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6a98 01-03 17:57:01.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315104C
[6a9c 01-03 17:57:01.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6aa0 01-03 17:57:01.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a9d 01-03 17:57:01.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6a9e 01-03 17:57:01.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a9f 01-03 17:57:01.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B1B1EA05031539C7E10F296A3C7AE15607BC6E2F6CCF032FB131EE02928E0B79
[6aa1 01-03 17:57:01.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aa2 01-03 17:57:01.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[6aa3 01-03 17:57:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[6aa4 01-03 17:57:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[6aa5 01-03 17:57:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 750 bytes, Signature: 0 bytes
[6aa7 01-03 17:57:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6aa8 01-03 17:57:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[6aa9 01-03 17:57:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6aa6 01-03 17:57:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 738 bytes, Signature: 0 bytes
[6aab 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[6aac 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6aad 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aae 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[6aaf 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aaa 01-03 17:57:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 750 bytes, Signature: 0 bytes
[6ab1 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ab2 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ab3 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ab4 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074218415691500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes to 3 peers
[6ab5 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ab7 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074218415691500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6ab8 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ab9 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aba 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074218415691500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6abb 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6abc 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074218415691500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6abd 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6abe 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6abf 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6ac0 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ac1 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6ac2 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6ac3 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6ac4 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[6ac5 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[6ab0 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6ac6 01-03 17:57:01.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ab6 01-03 17:57:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ac7 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ac8 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6ac9 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031698c0 gate 1578074221430885700 evaluation starts
[6aca 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031698c0 signed by 0 principal evaluation starts (used [false])
[6acb 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031698c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6acc 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031698c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6acd 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031698c0 principal evaluation fails
[6ace 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031698c0 gate 1578074221430885700 evaluation fails
[6acf 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6ad0 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6ad1 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6ad2 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[6ad3 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[6ad4 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[6ad5 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6ad6 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031301c0 gate 1578074221437405800 evaluation starts
[6ad7 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031301c0 signed by 0 principal evaluation starts (used [false])
[6ad8 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031301c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6ad9 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031301c0 principal evaluation succeeds for identity 0
[6ada 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031301c0 gate 1578074221437405800 evaluation succeeds
[6adb 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6adc 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6add 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6ade 01-03 17:57:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6adf 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 67 d3 54 ad 84 28 a5 83 66 ab a4 41 cd c8 71 |.g.T..(..f..A..q|
00000010 f5 4c 18 10 4a 49 48 7e 98 92 f8 8f ee 83 5a b6 |.L..JIH~......Z.|
[6ae0 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 3c c0 41 32 b6 f5 b9 2e 3e ad |0E.!..<.A2....>.|
00000010 27 e9 b6 df ff e1 77 1a 8b df 6e 98 39 ad 9f a4 |'.....w...n.9...|
00000020 ca b4 5a 12 6c 02 20 68 e3 6a 6c d0 c4 cb 39 29 |..Z.l. h.jl...9)|
00000030 1f 83 4a e1 69 d1 e9 da f3 79 41 08 3d 61 ce ff |..J.i....yA.=a..|
00000040 63 7b 3a 13 45 a7 50 |c{:.E.P|
[6ae1 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 ab 3b 29 ef e8 13 a1 11 5f 63 99 95 44 8c 69 |..;)....._c..D.i|
00000010 60 5a ae e4 e1 74 c9 e6 a6 f8 60 bd df 6e 50 4e |`Z...t....`..nPN|
[6ae2 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 45 09 38 af 85 9d ff 3f b5 27 1e |0D. TE.8....?.'.|
00000010 88 ff 3a 0d 92 0f d3 5f 2d cf dc fa 72 2c 1e b7 |..:...._-...r,..|
00000020 1e 45 90 fd 02 20 69 3c 10 fb d8 b2 8b 87 95 30 |.E... i<.......0|
00000030 51 72 8f db 5f 71 0e d5 25 1a f2 de a2 70 40 b5 |Qr.._q..%....p@.|
00000040 42 f5 65 29 f3 a6 |B.e)..|
[6ae3 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ae4 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ae5 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6ae6 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6ae7 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6ae8 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6ae9 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6aea 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6aeb 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6aec 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6aed 01-03 17:57:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6aee 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311cb50 gate 1578074221449999600 evaluation starts
[6aef 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311cb50 signed by 0 principal evaluation starts (used [false])
[6af0 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311cb50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6af1 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311cb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6af2 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311cb50 principal evaluation fails
[6af3 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311cb50 gate 1578074221449999600 evaluation fails
[6af4 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6af5 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6af6 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6af7 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6af8 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6af9 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6afa 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d460 gate 1578074221450555500 evaluation starts
[6afb 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d460 signed by 0 principal evaluation starts (used [false])
[6afc 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d460 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6afd 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d460 principal evaluation succeeds for identity 0
[6afe 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311d460 gate 1578074221450555500 evaluation succeeds
[6aff 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6b00 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6b01 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6b02 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6b03 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b04 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6b05 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b06 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b07 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b08 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b09 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6b0a 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6b0b 01-03 17:57:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b0c 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104310 gate 1578074221461662200 evaluation starts
[6b0d 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104310 signed by 0 principal evaluation starts (used [false])
[6b0e 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104310 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6b0f 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6b10 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104310 principal evaluation fails
[6b11 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104310 gate 1578074221461662200 evaluation fails
[6b12 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6b13 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6b14 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6b15 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6b16 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6b17 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b18 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104c30 gate 1578074221462201700 evaluation starts
[6b19 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104c30 signed by 0 principal evaluation starts (used [false])
[6b1a 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104c30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6b1b 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104c30 principal evaluation succeeds for identity 0
[6b1c 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104c30 gate 1578074221462201700 evaluation succeeds
[6b1d 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6b1e 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6b1f 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6b20 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6b21 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b22 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6b23 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[6b24 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[6b25 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315101C1801
[6b26 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 70ACD3DC8EFA9CB26501D9416D5EF846C64D39EED05B8D2576AE95D8BD6B80A3
[6b27 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[6b28 01-03 17:57:01.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 738 bytes, Signature: 0 bytes
[6b29 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b2a 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b2b 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b2c 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b2d 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b2e 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b2f 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b30 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6b31 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6b32 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b33 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b34 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:28 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[6b36 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b37 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b35 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b38 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b39 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:28 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[6b3a 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b3b 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[6b3c 01-03 17:57:01.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[6b3d 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b3e 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003088ae0 gate 1578074221481435200 evaluation starts
[6b3f 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003088ae0 signed by 0 principal evaluation starts (used [false])
[6b40 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003088ae0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6b41 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003088ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6b42 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003088ae0 principal evaluation fails
[6b43 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003088ae0 gate 1578074221481435200 evaluation fails
[6b44 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6b45 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6b46 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6b47 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[6b48 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[6b49 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b4a 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030893e0 gate 1578074221486574000 evaluation starts
[6b4b 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030893e0 signed by 0 principal evaluation starts (used [false])
[6b4c 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030893e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6b4d 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030893e0 principal evaluation succeeds for identity 0
[6b4e 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030893e0 gate 1578074221486574000 evaluation succeeds
[6b4f 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6b50 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6b51 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6b52 01-03 17:57:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6b53 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 7b 16 c6 e1 af cf 80 d2 7c 52 e8 65 54 de 22 |.{.......|R.eT."|
00000010 d1 5e 1f 74 78 e8 94 58 07 a1 ee 9b 97 ba 04 b2 |.^.tx..X........|
[6b54 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 9d 7b 06 69 3d dd bb 4f 0c 3c 36 |0D. 9.{.i=..O.<6|
00000010 3e dd 66 92 b5 06 f4 15 c9 92 f2 dd eb 3d b0 0c |>.f..........=..|
00000020 16 14 d7 1f 02 20 56 39 85 7e 89 b0 57 55 32 d5 |..... V9.~..WU2.|
00000030 58 58 3a 00 46 35 83 83 de e7 84 62 d4 05 d6 18 |XX:.F5.....b....|
00000040 d1 70 6c 7d 29 ab |.pl}).|
[6b55 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 67 d3 54 ad 84 28 a5 83 66 ab a4 41 cd c8 71 |.g.T..(..f..A..q|
00000010 f5 4c 18 10 4a 49 48 7e 98 92 f8 8f ee 83 5a b6 |.L..JIH~......Z.|
[6b56 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 3c c0 41 32 b6 f5 b9 2e 3e ad |0E.!..<.A2....>.|
00000010 27 e9 b6 df ff e1 77 1a 8b df 6e 98 39 ad 9f a4 |'.....w...n.9...|
00000020 ca b4 5a 12 6c 02 20 68 e3 6a 6c d0 c4 cb 39 29 |..Z.l. h.jl...9)|
00000030 1f 83 4a e1 69 d1 e9 da f3 79 41 08 3d 61 ce ff |..J.i....yA.=a..|
00000040 63 7b 3a 13 45 a7 50 |c{:.E.P|
[6b57 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b58 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b59 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6b5a 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6b5b 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b5c 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b5d 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b5e 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b5f 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6b60 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6b61 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b62 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303dbe0 gate 1578074221496792200 evaluation starts
[6b63 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303dbe0 signed by 0 principal evaluation starts (used [false])
[6b64 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303dbe0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6b65 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303dbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6b66 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303dbe0 principal evaluation fails
[6b67 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303dbe0 gate 1578074221496792200 evaluation fails
[6b68 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6b69 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6b6a 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6b6b 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6b6c 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6b6d 01-03 17:57:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b6e 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030024e0 gate 1578074221499975300 evaluation starts
[6b6f 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030024e0 signed by 0 principal evaluation starts (used [false])
[6b70 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030024e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6b71 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030024e0 principal evaluation succeeds for identity 0
[6b72 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030024e0 gate 1578074221499975300 evaluation succeeds
[6b73 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6b74 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6b75 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6b76 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6b77 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b78 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6b79 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b7a 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b7b 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b7c 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b7d 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6b7e 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6b7f 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b80 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003270 gate 1578074221505580700 evaluation starts
[6b81 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003270 signed by 0 principal evaluation starts (used [false])
[6b82 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003270 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6b83 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6b84 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003270 principal evaluation fails
[6b85 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003270 gate 1578074221505580700 evaluation fails
[6b86 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6b87 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6b88 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6b89 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6b8a 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6b8b 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b8c 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003c30 gate 1578074221507660000 evaluation starts
[6b8d 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003c30 signed by 0 principal evaluation starts (used [false])
[6b8e 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003c30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6b8f 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003c30 principal evaluation succeeds for identity 0
[6b90 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003c30 gate 1578074221507660000 evaluation succeeds
[6b91 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6b92 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6b93 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6b94 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6b95 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b96 01-03 17:57:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[6b97 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b99 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes
[6b98 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[6b9a 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[6b9b 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b9c 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6b9d 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6b9e 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b9f 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6ba0 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6ba1 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6ba2 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 77 12 2a 64 1d 5e ad 06 f0 fc 9b 59 b7 88 7d |.w.*d.^.....Y..}|
00000010 06 38 c1 b1 59 28 76 2a 4e cf 04 d4 0e 12 72 37 |.8..Y(v*N.....r7|
[6ba3 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 9f de 1e 3d a6 fc 34 f1 f3 22 |0E.!.....=..4.."|
00000010 74 7b 69 3a a4 85 9e 90 71 88 c2 b7 08 af 43 15 |t{i:....q.....C.|
00000020 83 28 12 94 03 02 20 11 00 97 c5 9b ac 75 73 77 |.(.... ......usw|
00000030 87 0e b8 63 b9 0e 8f 2c 97 e0 9e 5e 94 9c f4 ff |...c...,...^....|
00000040 d0 4b d0 fa 40 f3 66 |.K..@.f|
[6ba4 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6ba5 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc88e0 gate 1578074221512589500 evaluation starts
[6ba6 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc88e0 signed by 0 principal evaluation starts (used [false])
[6ba7 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc88e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6ba8 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc88e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6ba9 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc88e0 principal evaluation fails
[6baa 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc88e0 gate 1578074221512589500 evaluation fails
[6bab 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6bac 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6bad 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6bae 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 77 12 2a 64 1d 5e ad 06 f0 fc 9b 59 b7 88 7d |.w.*d.^.....Y..}|
00000010 06 38 c1 b1 59 28 76 2a 4e cf 04 d4 0e 12 72 37 |.8..Y(v*N.....r7|
[6baf 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 9f de 1e 3d a6 fc 34 f1 f3 22 |0E.!.....=..4.."|
00000010 74 7b 69 3a a4 85 9e 90 71 88 c2 b7 08 af 43 15 |t{i:....q.....C.|
00000020 83 28 12 94 03 02 20 11 00 97 c5 9b ac 75 73 77 |.(.... ......usw|
00000030 87 0e b8 63 b9 0e 8f 2c 97 e0 9e 5e 94 9c f4 ff |...c...,...^....|
00000040 d0 4b d0 fa 40 f3 66 |.K..@.f|
[6bb0 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6bb1 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc91e0 gate 1578074221517845200 evaluation starts
[6bb2 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc91e0 signed by 0 principal evaluation starts (used [false])
[6bb3 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc91e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6bb4 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc91e0 principal evaluation succeeds for identity 0
[6bb5 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc91e0 gate 1578074221517845200 evaluation succeeds
[6bb6 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6bb7 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6bb8 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6bb9 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6bba 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes
[6bbb 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6bbc 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6bbd 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 b1 ea 05 03 15 39 c7 e1 0f 29 6a 3c 7a e1 56 |......9...)j<z.V|
00000010 07 bc 6e 2f 6c cf 03 2f b1 31 ee 02 92 8e 0b 79 |..n/l../.1.....y|
[6bbe 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 d9 ea 68 86 c7 fe 31 49 c7 23 4d |0D. R..h...1I.#M|
00000010 e3 b1 77 bd 2b 99 9e 55 51 97 9b 7d bb 1e 1a 4a |..w.+..UQ..}...J|
00000020 a6 93 3c 41 02 20 29 71 70 b7 cb 4b b1 c3 64 94 |..<A. )qp..K..d.|
00000030 e3 b3 c9 37 49 9a 55 74 0b b7 5b 6d a1 e8 15 a3 |...7I.Ut..[m....|
00000040 3c e0 0b 2f 2a d3 |<../*.|
[6bbf 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[6bc0 01-03 17:57:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[6bc1 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6bc2 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[6bc3 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 23 c1 fa 59 c7 2e 8a f2 2a 34 90 34 11 f9 36 |.#..Y....*4.4..6|
00000010 df f9 f0 5a 9d f3 19 98 8f de 8f b6 25 c0 8a 11 |...Z........%...|
[6bc4 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 31 d2 d6 f3 c2 da 66 f3 ff bc |0E.!..1.....f...|
00000010 00 57 08 02 c3 17 e9 b2 76 63 63 3a 6d 2c 0d 58 |.W......vcc:m,.X|
00000020 cf 19 4d 1f 8b 02 20 0d 93 60 27 68 b9 6f a2 ae |..M... ..`'h.o..|
00000030 a2 4f 32 4e b3 ee 19 5a 9c 2a fd 8a db 52 74 3f |.O2N...Z.*...Rt?|
00000040 9f f5 44 d4 0d fe ff |..D....|
[6bc5 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes
[6bc6 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6bc7 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6bc8 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bc9 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bca 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6bcb 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6bcc 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6bcd 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6bce 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6bcf 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6bd0 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[6bd1 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[6bd2 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6bd3 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefb00 gate 1578074221523102000 evaluation starts
[6bd4 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefb00 signed by 0 principal evaluation starts (used [false])
[6bd5 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefb00 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6bd6 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6bd7 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefb00 principal evaluation fails
[6bd8 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fefb00 gate 1578074221523102000 evaluation fails
[6bd9 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6bda 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6bdb 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6bdc 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 83 bc 65 e1 4f 63 0b b1 69 b1 f6 d5 8c 3a 19 |...e.Oc..i....:.|
00000010 95 5a 3c b7 6f 54 b1 10 b6 bd 23 ce 10 9c 03 fb |.Z<.oT....#.....|
[6bdd 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa f3 6a 99 40 c9 d1 ed 40 6c ff |0E.!...j.@...@l.|
00000010 33 b1 39 ae 7c f8 8f 5b 31 71 82 01 1c 88 c3 1a |3.9.|..[1q......|
00000020 d6 65 ea 31 4f 02 20 29 d1 82 0d cc 89 d4 da b5 |.e.1O. )........|
00000030 b5 cb 89 92 67 f9 af f8 ca c1 8d a7 b0 a4 2b 7f |....g.........+.|
00000040 f3 d4 7a 1f 13 4a 5d |..z..J]|
[6bde 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6bdf 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10400 gate 1578074221524661600 evaluation starts
[6be0 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10400 signed by 0 principal evaluation starts (used [false])
[6be1 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10400 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6be2 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10400 principal evaluation succeeds for identity 0
[6be3 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e10400 gate 1578074221524661600 evaluation succeeds
[6be4 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6be5 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6be6 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6be7 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6be8 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 7b 16 c6 e1 af cf 80 d2 7c 52 e8 65 54 de 22 |.{.......|R.eT."|
00000010 d1 5e 1f 74 78 e8 94 58 07 a1 ee 9b 97 ba 04 b2 |.^.tx..X........|
[6be9 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 9d 7b 06 69 3d dd bb 4f 0c 3c 36 |0D. 9.{.i=..O.<6|
00000010 3e dd 66 92 b5 06 f4 15 c9 92 f2 dd eb 3d b0 0c |>.f..........=..|
00000020 16 14 d7 1f 02 20 56 39 85 7e 89 b0 57 55 32 d5 |..... V9.~..WU2.|
00000030 58 58 3a 00 46 35 83 83 de e7 84 62 d4 05 d6 18 |XX:.F5.....b....|
00000040 d1 70 6c 7d 29 ab |.pl}).|
[6bea 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6beb 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bec 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6bed 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6bee 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6bef 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6bf0 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6bf1 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6bf2 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[6bf3 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[6bf4 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6bf5 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9e5a0 gate 1578074221528274600 evaluation starts
[6bf6 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9e5a0 signed by 0 principal evaluation starts (used [false])
[6bf7 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9e5a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6bf8 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9e5a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6bf9 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9e5a0 principal evaluation fails
[6bfa 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9e5a0 gate 1578074221528274600 evaluation fails
[6bfb 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6bfc 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6bfd 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6bfe 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 ad 9d 23 1a 05 19 d2 1d e4 ad 70 96 97 70 04 |A..#.......p..p.|
00000010 c7 b1 b8 83 01 36 a3 76 7f df cf 21 10 85 06 a4 |.....6.v...!....|
[6bff 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 5d 32 45 8c 54 fd f2 19 30 c8 |0E.!..]2E.T...0.|
00000010 4c 9e 00 03 d4 97 0a 4e 39 df 19 35 73 17 fb ba |L......N9..5s...|
00000020 9d f4 59 fc db 02 20 19 bb 63 ed 37 49 8c e5 a5 |..Y... ..c.7I...|
00000030 a9 20 df 66 a2 c7 ed a5 ab 8f 74 76 79 3b 9c 98 |. .f......tvy;..|
00000040 29 4f 4f b0 d1 c4 16 |)OO....|
[6c00 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c01 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9eea0 gate 1578074221529600400 evaluation starts
[6c02 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9eea0 signed by 0 principal evaluation starts (used [false])
[6c03 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9eea0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6c04 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9eea0 principal evaluation succeeds for identity 0
[6c05 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d9eea0 gate 1578074221529600400 evaluation succeeds
[6c06 01-03 17:57:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6c07 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6c08 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6c09 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6c0a 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d e8 38 54 c5 ad 53 dd db 7f 5c c0 18 1e e7 c4 |..8T..S...\.....|
00000010 f4 db 5f 30 e4 e9 fc c0 a1 25 fe 5e 6f a6 1f cd |.._0.....%.^o...|
[6c0b 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 85 97 20 6d 8e 71 75 63 96 c5 d1 |0D. 9.. m.quc...|
00000010 2a dc 74 ab be 66 1d c8 53 7b 4f f6 b9 cc 61 f9 |*.t..f..S{O...a.|
00000020 84 17 70 f6 02 20 66 f5 a9 47 9d c9 6c c5 ca 67 |..p.. f..G..l..g|
00000030 6a 9b 44 04 44 02 26 04 13 b4 af da 49 ac 85 bb |j.D.D.&.....I...|
00000040 84 87 09 97 97 67 |.....g|
[6c0c 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6c0d 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6c0e 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6c0f 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6c10 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6c11 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d e8 38 54 c5 ad 53 dd db 7f 5c c0 18 1e e7 c4 |..8T..S...\.....|
00000010 f4 db 5f 30 e4 e9 fc c0 a1 25 fe 5e 6f a6 1f cd |.._0.....%.^o...|
[6c12 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 85 97 20 6d 8e 71 75 63 96 c5 d1 |0D. 9.. m.quc...|
00000010 2a dc 74 ab be 66 1d c8 53 7b 4f f6 b9 cc 61 f9 |*.t..f..S{O...a.|
00000020 84 17 70 f6 02 20 66 f5 a9 47 9d c9 6c c5 ca 67 |..p.. f..G..l..g|
00000030 6a 9b 44 04 44 02 26 04 13 b4 af da 49 ac 85 bb |j.D.D.&.....I...|
00000040 84 87 09 97 97 67 |.....g|
[6c13 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c14 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e210 gate 1578074221533466500 evaluation starts
[6c15 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e210 signed by 0 principal evaluation starts (used [false])
[6c16 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e210 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[6c17 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e210 principal evaluation succeeds for identity 0
[6c18 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d3e210 gate 1578074221533466500 evaluation succeeds
[6c19 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[6c1a 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6c1b 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6c1c 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6c1d 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c1e 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[6c1f 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c20 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[6c21 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6c22 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 b1 ea 05 03 15 39 c7 e1 0f 29 6a 3c 7a e1 56 |......9...)j<z.V|
00000010 07 bc 6e 2f 6c cf 03 2f b1 31 ee 02 92 8e 0b 79 |..n/l../.1.....y|
[6c23 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 d9 ea 68 86 c7 fe 31 49 c7 23 4d |0D. R..h...1I.#M|
00000010 e3 b1 77 bd 2b 99 9e 55 51 97 9b 7d bb 1e 1a 4a |..w.+..UQ..}...J|
00000020 a6 93 3c 41 02 20 29 71 70 b7 cb 4b b1 c3 64 94 |..<A. )qp..K..d.|
00000030 e3 b3 c9 37 49 9a 55 74 0b b7 5b 6d a1 e8 15 a3 |...7I.Ut..[m....|
00000040 3c e0 0b 2f 2a d3 |<../*.|
[6c24 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[6c25 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 05 f2 dc 04 95 99 88 eb ac e8 ac |0D. v...........|
00000010 ed 89 1c 7c b3 ad 1d 7e f3 be 47 47 5c 94 a3 e4 |...|...~..GG\...|
00000020 ae c0 48 30 02 20 5f a8 10 09 aa d1 dd f1 4a 8f |..H0. _.......J.|
00000030 a3 8f 7d 6c e3 3d 70 64 f6 de 4d 07 1b 26 a9 d2 |..}l.=pd..M..&..|
00000040 8c 51 1a 8b 31 88 |.Q..1.|
[6c26 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6c27 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6c28 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c29 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c2a 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6c2b 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c2c 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6c2d 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6c2e 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c2f 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6c30 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6c31 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6c32 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6c33 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6c34 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6c35 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 40 24 73 63 f5 02 71 e7 89 8c f4 8b 93 94 02 |.@$sc..q........|
00000010 36 51 d7 93 68 ab 00 1a 2b b2 af b1 ca 77 34 8f |6Q..h...+....w4.|
[6c36 01-03 17:57:01.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 48 80 50 6f 20 a5 da 6f d3 5d 21 |0D. IH.Po ..o.]!|
00000010 c6 2d 28 78 0b 4e fc 5c 8c 07 80 e4 d2 0a 09 d8 |.-(x.N.\........|
00000020 44 bb 14 dc 02 20 4e 71 a2 1b 56 f8 c5 6e b0 ef |D.... Nq..V..n..|
00000030 f3 bf 47 0e 5b 85 b7 6e 15 9f 65 5d fa 65 32 09 |..G.[..n..e].e2.|
00000040 eb 27 62 56 f2 3d |.'bV.=|
[6c37 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c38 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdc170 gate 1578074221540111900 evaluation starts
[6c39 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdc170 signed by 0 principal evaluation starts (used [false])
[6c3a 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdc170 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6c3b 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdc170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6c3c 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdc170 principal evaluation fails
[6c3d 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdc170 gate 1578074221540111900 evaluation fails
[6c3e 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6c3f 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6c40 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6c41 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 40 24 73 63 f5 02 71 e7 89 8c f4 8b 93 94 02 |.@$sc..q........|
00000010 36 51 d7 93 68 ab 00 1a 2b b2 af b1 ca 77 34 8f |6Q..h...+....w4.|
[6c42 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 48 80 50 6f 20 a5 da 6f d3 5d 21 |0D. IH.Po ..o.]!|
00000010 c6 2d 28 78 0b 4e fc 5c 8c 07 80 e4 d2 0a 09 d8 |.-(x.N.\........|
00000020 44 bb 14 dc 02 20 4e 71 a2 1b 56 f8 c5 6e b0 ef |D.... Nq..V..n..|
00000030 f3 bf 47 0e 5b 85 b7 6e 15 9f 65 5d fa 65 32 09 |..G.[..n..e].e2.|
00000040 eb 27 62 56 f2 3d |.'bV.=|
[6c43 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c44 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdcad0 gate 1578074221540499400 evaluation starts
[6c45 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdcad0 signed by 0 principal evaluation starts (used [false])
[6c46 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdcad0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6c47 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdcad0 principal evaluation succeeds for identity 0
[6c48 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cdcad0 gate 1578074221540499400 evaluation succeeds
[6c49 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6c4a 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6c4b 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6c4c 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6c4d 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[6c4e 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c4f 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[6c50 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 23 c1 fa 59 c7 2e 8a f2 2a 34 90 34 11 f9 36 |.#..Y....*4.4..6|
00000010 df f9 f0 5a 9d f3 19 98 8f de 8f b6 25 c0 8a 11 |...Z........%...|
[6c51 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 31 d2 d6 f3 c2 da 66 f3 ff bc |0E.!..1.....f...|
00000010 00 57 08 02 c3 17 e9 b2 76 63 63 3a 6d 2c 0d 58 |.W......vcc:m,.X|
00000020 cf 19 4d 1f 8b 02 20 0d 93 60 27 68 b9 6f a2 ae |..M... ..`'h.o..|
00000030 a2 4f 32 4e b3 ee 19 5a 9c 2a fd 8a db 52 74 3f |.O2N...Z.*...Rt?|
00000040 9f f5 44 d4 0d fe ff |..D....|
[6c52 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes
[6c53 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c54 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6c55 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 b1 ea 05 03 15 39 c7 e1 0f 29 6a 3c 7a e1 56 |......9...)j<z.V|
00000010 07 bc 6e 2f 6c cf 03 2f b1 31 ee 02 92 8e 0b 79 |..n/l../.1.....y|
[6c56 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 d9 ea 68 86 c7 fe 31 49 c7 23 4d |0D. R..h...1I.#M|
00000010 e3 b1 77 bd 2b 99 9e 55 51 97 9b 7d bb 1e 1a 4a |..w.+..UQ..}...J|
00000020 a6 93 3c 41 02 20 29 71 70 b7 cb 4b b1 c3 64 94 |..<A. )qp..K..d.|
00000030 e3 b3 c9 37 49 9a 55 74 0b b7 5b 6d a1 e8 15 a3 |...7I.Ut..[m....|
00000040 3c e0 0b 2f 2a d3 |<../*.|
[6c57 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[6c58 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[6c59 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c5a 01-03 17:57:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c5b 01-03 17:57:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c5c 01-03 17:57:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c5d 01-03 17:57:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[6c5e 01-03 17:57:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c5f 01-03 17:57:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c60 01-03 17:57:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11278326325155231706 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[6c61 01-03 17:57:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11278326325155231706 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[6c62 01-03 17:57:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c63 01-03 17:57:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11278326325155231706 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5], Envelope: 49 bytes, Signature: 0 bytes
[6c64 01-03 17:57:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11278326325155231706 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5], Envelope: 49 bytes, Signature: 0 bytes
[6c65 01-03 17:57:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c66 01-03 17:57:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074218678631600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6c67 01-03 17:57:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074218678631600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6c68 01-03 17:57:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d e8 38 54 c5 ad 53 dd db 7f 5c c0 18 1e e7 c4 |..8T..S...\.....|
00000010 f4 db 5f 30 e4 e9 fc c0 a1 25 fe 5e 6f a6 1f cd |.._0.....%.^o...|
[6c69 01-03 17:57:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 85 97 20 6d 8e 71 75 63 96 c5 d1 |0D. 9.. m.quc...|
00000010 2a dc 74 ab be 66 1d c8 53 7b 4f f6 b9 cc 61 f9 |*.t..f..S{O...a.|
00000020 84 17 70 f6 02 20 66 f5 a9 47 9d c9 6c c5 ca 67 |..p.. f..G..l..g|
00000030 6a 9b 44 04 44 02 26 04 13 b4 af da 49 ac 85 bb |j.D.D.&.....I...|
00000040 84 87 09 97 97 67 |.....g|
[6c6a 01-03 17:57:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c6b 01-03 17:57:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c6c 01-03 17:57:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074218678631600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6c6d 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074218678631600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6c6e 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d e8 38 54 c5 ad 53 dd db 7f 5c c0 18 1e e7 c4 |..8T..S...\.....|
00000010 f4 db 5f 30 e4 e9 fc c0 a1 25 fe 5e 6f a6 1f cd |.._0.....%.^o...|
[6c6f 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 85 97 20 6d 8e 71 75 63 96 c5 d1 |0D. 9.. m.quc...|
00000010 2a dc 74 ab be 66 1d c8 53 7b 4f f6 b9 cc 61 f9 |*.t..f..S{O...a.|
00000020 84 17 70 f6 02 20 66 f5 a9 47 9d c9 6c c5 ca 67 |..p.. f..G..l..g|
00000030 6a 9b 44 04 44 02 26 04 13 b4 af da 49 ac 85 bb |j.D.D.&.....I...|
00000040 84 87 09 97 97 67 |.....g|
[6c70 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c71 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c72 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[6c73 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c74 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c75 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c76 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074218678631600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6c77 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d e8 38 54 c5 ad 53 dd db 7f 5c c0 18 1e e7 c4 |..8T..S...\.....|
00000010 f4 db 5f 30 e4 e9 fc c0 a1 25 fe 5e 6f a6 1f cd |.._0.....%.^o...|
[6c78 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 85 97 20 6d 8e 71 75 63 96 c5 d1 |0D. 9.. m.quc...|
00000010 2a dc 74 ab be 66 1d c8 53 7b 4f f6 b9 cc 61 f9 |*.t..f..S{O...a.|
00000020 84 17 70 f6 02 20 66 f5 a9 47 9d c9 6c c5 ca 67 |..p.. f..G..l..g|
00000030 6a 9b 44 04 44 02 26 04 13 b4 af da 49 ac 85 bb |j.D.D.&.....I...|
00000040 84 87 09 97 97 67 |.....g|
[6c79 01-03 17:57:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c7a 01-03 17:57:01.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6c7b 01-03 17:57:01.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c7c 01-03 17:57:01.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6c7d 01-03 17:57:01.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[6c7e 01-03 17:57:01.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 30 a3 bc e6 ca 7e 93 c0 d8 9f 55 56 01 d2 41 0b |0....~....UV..A.|
00000010 05 33 b6 40 82 70 11 a0 2d 3d e9 57 f5 70 96 78 |.3.@.p..-=.W.p.x|
[6c7f 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 dc 7a 39 6b d2 3f f8 3a 96 ac |0E.!...z9k.?.:..|
00000010 97 06 df 64 18 61 c5 27 5e 60 6c 13 10 a0 1e a1 |...d.a.'^`l.....|
00000020 bd b6 b5 29 ba 02 20 79 9b f0 40 87 fd 9e de 42 |...).. y..@....B|
00000030 d7 51 dc fa db b2 0c be 5a a0 9a b2 71 5b 83 af |.Q......Z...q[..|
00000040 86 c2 ab 0d f5 6e 47 |.....nG|
[6c80 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[6c81 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 a6 e8 9b f1 5a bd 2b f6 9f 5a 95 |0D. %....Z.+..Z.|
00000010 11 50 4e cc 9a 0a c7 28 ee 20 1f 22 f1 7f a7 77 |.PN....(. ."...w|
00000020 e9 23 b8 10 02 20 0b c4 d1 44 fa 50 5c aa 76 d1 |.#... ...D.P\.v.|
00000030 5d 18 2c eb 61 6e d5 1e 2c 3e 29 29 93 f2 28 88 |].,.an..,>))..(.|
00000040 d1 76 62 a4 69 d2 |.vb.i.|
[6c82 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6c83 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[6c84 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80
[6c85 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80
[6c86 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[6c87 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c88 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c89 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c8a 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c8b 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c8c 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c8d 01-03 17:57:01.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6c8e 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c8f 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6c90 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6c91 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c92 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6c93 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c94 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6c95 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6c96 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c97 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6c98 01-03 17:57:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c99 01-03 17:57:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6c9a 01-03 17:57:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6c9b 01-03 17:57:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c9c 01-03 17:57:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6c9d 01-03 17:57:01.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c9e 01-03 17:57:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8096094545121518222 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[6c9f 01-03 17:57:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8096094545121518222 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[6ca0 01-03 17:57:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[6ca1 01-03 17:57:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ca2 01-03 17:57:02.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[6ca3 01-03 17:57:02.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[6ca4 01-03 17:57:02.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ca5 01-03 17:57:02.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ca6 01-03 17:57:02.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ca7 01-03 17:57:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ca8 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074218578716600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[6ca9 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074218578716600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[6caa 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cab 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6cac 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6cad 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6cae 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6caf 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6cb0 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6cb1 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6cb2 01-03 17:57:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6cb3 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6cb4 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d9b0 gate 1578074222120894200 evaluation starts
[6cb5 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d9b0 signed by 0 principal evaluation starts (used [false])
[6cb6 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d9b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6cb7 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6cb8 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d9b0 principal evaluation fails
[6cb9 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d9b0 gate 1578074222120894200 evaluation fails
[6cba 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6cbb 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6cbc 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6cbd 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6cbe 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6cbf 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6cc0 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e300 gate 1578074222124272800 evaluation starts
[6cc1 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e300 signed by 0 principal evaluation starts (used [false])
[6cc2 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e300 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6cc3 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e300 principal evaluation succeeds for identity 0
[6cc4 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087e300 gate 1578074222124272800 evaluation succeeds
[6cc5 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6cc6 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6cc7 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6cc8 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6cc9 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cca 01-03 17:57:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ccb 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074218578716600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[6ccc 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074218578716600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[6ccd 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cce 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6ccf 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6cd0 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6cd1 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6cd2 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6cd3 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6cd4 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6cd5 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6cd6 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6cd7 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374f10 gate 1578074222148592200 evaluation starts
[6cd8 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374f10 signed by 0 principal evaluation starts (used [false])
[6cd9 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374f10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6cda 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6cdb 01-03 17:57:02.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374f10 principal evaluation fails
[6cdc 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374f10 gate 1578074222148592200 evaluation fails
[6cdd 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6cde 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6cdf 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6ce0 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6ce1 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6ce2 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6ce3 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375810 gate 1578074222153164000 evaluation starts
[6ce4 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375810 signed by 0 principal evaluation starts (used [false])
[6ce5 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375810 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6ce6 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375810 principal evaluation succeeds for identity 0
[6ce7 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375810 gate 1578074222153164000 evaluation succeeds
[6ce8 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6ce9 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6cea 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6ceb 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6cec 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ced 01-03 17:57:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6cee 01-03 17:57:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[6cef 01-03 17:57:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[6cf0 01-03 17:57:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cf1 01-03 17:57:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cf2 01-03 17:57:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cf3 01-03 17:57:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6cf4 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074218492720300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[6cf5 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074218492720300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[6cf6 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cf7 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6cf8 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6cf9 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6cfa 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6cfb 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6cfc 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6cfd 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6cfe 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6cff 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6d00 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035dd40 gate 1578074222377532100 evaluation starts
[6d01 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035dd40 signed by 0 principal evaluation starts (used [false])
[6d02 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035dd40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6d03 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035dd40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6d04 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035dd40 principal evaluation fails
[6d05 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00035dd40 gate 1578074222377532100 evaluation fails
[6d06 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6d07 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6d08 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6d09 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6d0a 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6d0b 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6d0c 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000334640 gate 1578074222378090800 evaluation starts
[6d0d 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000334640 signed by 0 principal evaluation starts (used [false])
[6d0e 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000334640 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6d0f 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000334640 principal evaluation succeeds for identity 0
[6d10 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000334640 gate 1578074222378090800 evaluation succeeds
[6d11 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6d12 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6d13 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6d14 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6d15 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d16 01-03 17:57:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d17 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6d18 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[6d19 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[6d1a 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6d1b 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[6d1c 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 4b 11 54 2b cc cd f4 2e 7f 1e de d6 67 10 07 |.K.T+........g..|
00000010 07 25 55 5f 49 05 ec eb 85 e7 82 73 fc 0a 08 f9 |.%U_I......s....|
[6d1d 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 58 51 a4 ff 0e c7 13 3f cf 0f |0E.!..XQ.....?..|
00000010 eb 02 d4 70 31 78 39 14 1c 8d 45 c6 10 89 7a 59 |...p1x9...E...zY|
00000020 a0 df be a0 89 02 20 73 03 a6 d2 25 68 b3 e3 eb |...... s...%h...|
00000030 28 05 f1 df eb 12 3a 35 22 ce 1d 6b e4 f6 eb 63 |(.....:5"..k...c|
00000040 e7 7d 03 85 94 9a 90 |.}.....|
[6d1e 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6d1f 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f190 gate 1578074222516115500 evaluation starts
[6d20 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f190 signed by 0 principal evaluation starts (used [false])
[6d21 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f190 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[6d22 01-03 17:57:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f190 principal evaluation succeeds for identity 0
[6d23 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00087f190 gate 1578074222516115500 evaluation succeeds
[6d24 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[6d25 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[6d26 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[6d27 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[6d28 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [6] channel=businesschannel
[6d29 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6]
[6d2b 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]
[6d2c 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger
[6d2d 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer
[6d2e 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6]
[6d2f 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6]
[6d30 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[6d31 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00339e000 env 0xc00334b450 txn 0
[6d32 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00334b450
[6d33 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\354\200\276\360\005\020\354\350\375\327\001\"\017businesschannel*@4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\227\227\315\374\367\370\027vN\022\t[\353\302o\023GG\203\005n\023\212\234"
[6d34 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[6d35 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[6d36 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[6d37 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[6d38 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[6d39 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b b3 09 a4 68 d1 b6 79 fb 17 14 9f a5 34 de 38 |{...h..y.....4.8|
00000010 74 34 9f dc 9f 36 22 0f a8 20 d3 a9 ee 49 be 67 |t4...6".. ...I.g|
[6d3a 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ea eb 12 68 e3 5f d5 18 26 3f |0E.!.....h._..&?|
00000010 61 0d 4a f7 dc a1 66 64 46 3b 5c 7d 95 07 c3 3c |a.J...fdF;\}...<|
00000020 c5 fc 08 45 d2 02 20 6c b7 62 ce 3c db 30 46 1d |...E.. l.b.<.0F.|
00000030 f8 db ea 2f 7d 5c 4c c7 1d cc 8d 6a 81 49 ad 73 |.../}\L....j.I.s|
00000040 09 6e c5 7f a8 c2 49 |.n....I|
[6d3b 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[6d3c 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00089b800, header channel_header:"\010\003\032\014\010\354\200\276\360\005\020\354\350\375\327\001\"\017businesschannel*@4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\227\227\315\374\367\370\027vN\022\t[\353\302o\023GG\203\005n\023\212\234"
[6d3d 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[6d3e 01-03 17:57:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[6d3f 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[6d40 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[6d41 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea]
[6d42 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x34, 0x64, 0x64, 0x36, 0x33, 0x38, 0x64, 0x38, 0x31, 0x31, 0x65, 0x38, 0x37, 0x39, 0x35, 0x35, 0x63, 0x33, 0x34, 0x38, 0x64, 0x36, 0x35, 0x36, 0x34, 0x34, 0x62, 0x61, 0x34, 0x36, 0x33, 0x33, 0x34, 0x36, 0x37, 0x30, 0x62, 0x36, 0x62, 0x35, 0x61, 0x37, 0x32, 0x61, 0x38, 0x65, 0x32, 0x32, 0x39, 0x61, 0x64, 0x35, 0x31, 0x30, 0x34, 0x38, 0x63, 0x36, 0x37, 0x63, 0x31, 0x36, 0x65, 0x61}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x34, 0x64, 0x64, 0x36, 0x33, 0x38, 0x64, 0x38, 0x31, 0x31, 0x65, 0x38, 0x37, 0x39, 0x35, 0x35, 0x63, 0x33, 0x34, 0x38, 0x64, 0x36, 0x35, 0x36, 0x34, 0x34, 0x62, 0x61, 0x34, 0x36, 0x33, 0x33, 0x34, 0x36, 0x37, 0x30, 0x62, 0x36, 0x62, 0x35, 0x61, 0x37, 0x32, 0x61, 0x38, 0x65, 0x32, 0x32, 0x39, 0x61, 0x64, 0x35, 0x31, 0x30, 0x34, 0x38, 0x63, 0x36, 0x37, 0x63, 0x31, 0x36, 0x65, 0x61, 0xff}]
[6d43 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[6d44 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc002b13800
[6d45 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [deb2ad76-f06e-4535-886b-03cac6126ef8]
[6d46 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[6d47 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6d48 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo
[6d49 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo
[6d4a 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections
[6d4b 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [deb2ad76-f06e-4535-886b-03cac6126ef8]
[6d4c 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin
[6d4d 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [75c5aa9e-fc2a-4349-b4bb-04a847768bb1]
[6d4e 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [75c5aa9e-fc2a-4349-b4bb-04a847768bb1]
[6d4f 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 6a 6a 18 f2 56 ae b6 6a 43 c5 9a f3 97 ed a0 |.jj..V..jC......|
00000010 b0 d7 1b f9 a9 8a a2 ad 8e 75 29 d1 32 9d 01 91 |.........u).2...|
[6d50 01-03 17:57:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f c5 d6 b7 b2 86 4b cd a0 2f 99 26 |0D. ......K../.&|
00000010 81 3a c4 d1 ad b0 61 75 84 66 06 f8 ad 94 b9 56 |.:....au.f.....V|
00000020 bb 31 ba be 02 20 18 0d 34 3c 4f 29 f9 69 a3 5a |.1... ..4<O).i.Z|
00000030 d1 04 4d 40 14 dd 64 00 6d 3a 2c 9c 9a 92 78 09 |..M@..d.m:,...x.|
00000040 1f f8 14 59 96 de |...Y..|
[6d51 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6d52 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030ae50 gate 1578074222551121200 evaluation starts
[6d53 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030ae50 signed by 0 principal evaluation starts (used [false])
[6d54 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030ae50 processing identity 0 - &{Org1MSP 72d14a8ffb3355b2cd5ce4f5575706e3d93f82ccf34f87f37b6ede3c9fbcf9a5}
[6d55 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030ae50 principal evaluation succeeds for identity 0
[6d56 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030ae50 signed by 1 principal evaluation starts (used [true])
[6d57 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030ae50 skipping identity 0 because it has already been used
[6d58 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030ae50 principal evaluation fails
[6d59 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030ae50 gate 1578074222551121200 evaluation succeeds
[6d5a 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [feb6b3d0-c154-41a4-ae1a-f70f5127e598]
[6d5b 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [feb6b3d0-c154-41a4-ae1a-f70f5127e598]
[6d5c 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2c94d92b-ebc4-42f6-a0b8-a915b2f26ff7]
[6d5d 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2c94d92b-ebc4-42f6-a0b8-a915b2f26ff7]
[6d5e 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU block 6, namespace: exp02, tx 0 validation results is: <nil>
[6d5f 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea appears to be valid
[6d60 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc002b13800
[6d61 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00339e000 env 0xc00334b450 txn 0
[6d62 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[6d63 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 21ms
[6d64 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[6d65 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[6d66 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[6d67 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [6] channel=businesschannel
[6d68 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6]
[6d69 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[6d6a 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[6d6b 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[6d6c 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6]
[6d6d 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[6d6e 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[6d6f 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6d70 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}
[6d71 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[6d72 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6d73 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea] marked as valid by state validator. ContainsPostOrderWrites [false]
[6d74 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc00339f140), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00339f180), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00339f1c0)}
[6d75 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[6d76 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[6d77 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[6d78 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6]
[6d79 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage
[6d7a 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store
[6d7b 01-03 17:57:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6]
[6d2a 01-03 17:57:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[6d7c 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [6] channel=businesschannel
[6d7d 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6]
[6d7e 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4064 bytes, seq: 6}, Envelope: 4094 bytes, Signature: 0 bytes to the block puller
[6d7f 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6
[6d80 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0x37, 0x96, 0xf5, 0xff, 0x7e, 0xc3, 0x16, 0xe0, 0x38, 0xe, 0x83, 0xf2, 0xf6, 0x1a, 0xe8, 0xe4, 0x26, 0xfd, 0xf6, 0x75, 0x55, 0xb6, 0xde, 0xbb, 0xf2, 0x67, 0x9, 0xb3, 0xc4, 0xa2, 0x96, 0x69} txOffsets=
txId=4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea locPointer=offset=70, bytesLength=3054
]
[6d81 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=86803, bytesLength=3054] for tx ID: [4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea] to txid-index
[6d82 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=86803, bytesLength=3054] for tx number:[0] ID: [4dd638d811e87955c348d65644ba46334670b6b5a72a8e229ad51048c67c16ea] to blockNumTranNum index
[6d83 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90819], isChainEmpty=[false], lastBlockNumber=[6]
[6d84 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database
[6d85 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[6d86 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[6d87 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[6d88 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[6d89 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02􏿿initialized] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]
[6d8a 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02a] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]
[6d8b 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02b] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]
[6d8c 01-03 17:57:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[6d8d 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7]
[6d8e 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]
[6d8f 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7]
[6d90 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[6d91 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database
[6d92 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions
[6d93 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6]
[6d94 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 20ms (state_validation=0ms block_and_pvtdata_commit=12ms state_commit=5ms) commitHash=[0e161bf9fc8702abb1e6b78fabbc1136c2c13997d895c7e01b798f7c11b093dd]
[6d95 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6A121408908FF491D1C09CF315...2A0E08071A0A0A056578703032120131
[6d96 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 09BADD065C2715BA478B4726941777D0B4B536C86A35CBE1E9FD3FB7BF298EA8
[6d97 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s)
[6d98 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d99 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d9a 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d9b 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d9c 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4064 bytes, seq: 6}, Envelope: 4094 bytes, Signature: 0 bytes to 1 peers
[6d9d 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d9f 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d9e 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4064 bytes, seq: 6}, Envelope: 4094 bytes, Signature: 0 bytes
[6da0 01-03 17:57:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6da1 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6da2 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6da3 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6da4 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6da5 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[6da6 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6da7 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6da8 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6da9 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6daa 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6dab 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6dac 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6dad 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 36 4c bc 8b c3 2c 83 37 ee 7a 44 ca b8 43 32 |.6L...,.7.zD..C2|
00000010 97 ed fe ef 11 13 6a f9 ec ed 90 a0 04 82 a6 9a |......j.........|
[6dae 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 c9 ec 5a ee aa ad 9c 70 9c 34 66 |0D. R..Z....p.4f|
00000010 fd 43 61 84 89 8d 18 a2 5c b1 9b c3 05 87 b8 54 |.Ca.....\......T|
00000020 03 2f 4c d2 02 20 45 7a cd cb 5f 90 f8 ec 05 2c |./L.. Ez.._....,|
00000030 98 da f4 c5 ea ee ac f8 5b 43 2f f3 00 48 81 51 |........[C/..H.Q|
00000040 15 d3 e6 8e 0d eb |......|
[6daf 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6db0 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002125e0 gate 1578074222973537100 evaluation starts
[6db1 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002125e0 signed by 0 principal evaluation starts (used [false])
[6db2 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002125e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6db3 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002125e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6db4 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002125e0 principal evaluation fails
[6db5 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002125e0 gate 1578074222973537100 evaluation fails
[6db6 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6db7 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6db8 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6db9 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 36 4c bc 8b c3 2c 83 37 ee 7a 44 ca b8 43 32 |.6L...,.7.zD..C2|
00000010 97 ed fe ef 11 13 6a f9 ec ed 90 a0 04 82 a6 9a |......j.........|
[6dba 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 c9 ec 5a ee aa ad 9c 70 9c 34 66 |0D. R..Z....p.4f|
00000010 fd 43 61 84 89 8d 18 a2 5c b1 9b c3 05 87 b8 54 |.Ca.....\......T|
00000020 03 2f 4c d2 02 20 45 7a cd cb 5f 90 f8 ec 05 2c |./L.. Ez.._....,|
00000030 98 da f4 c5 ea ee ac f8 5b 43 2f f3 00 48 81 51 |........[C/..H.Q|
00000040 15 d3 e6 8e 0d eb |......|
[6dbb 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6dbc 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212ee0 gate 1578074222977410800 evaluation starts
[6dbd 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212ee0 signed by 0 principal evaluation starts (used [false])
[6dbe 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212ee0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6dbf 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212ee0 principal evaluation succeeds for identity 0
[6dc0 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000212ee0 gate 1578074222977410800 evaluation succeeds
[6dc1 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6dc2 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6dc3 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6dc4 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6dc5 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6dc6 01-03 17:57:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes]}
[6dc7 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78
[6dc8 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78
[6dc9 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:77 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[6dca 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6dcb 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6dcc 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6dcd 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dce 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dcf 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dd0 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dd1 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dd2 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dd3 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6dd4 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dd5 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dd6 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6dd7 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6dd8 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6dd9 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6dda 01-03 17:57:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ddb 01-03 17:57:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6ddc 01-03 17:57:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ddd 01-03 17:57:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6dde 01-03 17:57:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ddf 01-03 17:57:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6de0 01-03 17:57:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6de1 01-03 17:57:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6de2 01-03 17:57:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6de3 01-03 17:57:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6de4 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6de5 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6de6 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6de7 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6de8 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6de9 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6dea 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6deb 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6dec 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6ded 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6dee 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6def 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6df0 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 4c ea 06 95 9f b5 40 7c f1 d3 37 be 5f c8 c7 |.L.....@|..7._..|
00000010 9b 86 36 52 a9 71 07 8f 78 35 a9 26 bb 07 fd fe |..6R.q..x5.&....|
[6df1 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb b3 bb 65 30 ae 14 38 f2 8c a1 |0E.!....e0..8...|
00000010 e7 4e 7c 87 13 e3 1a 69 b6 f3 98 a6 0e de 17 3a |.N|....i.......:|
00000020 d6 00 0f d6 d1 02 20 59 61 f6 0e 49 63 d5 26 06 |...... Ya..Ic.&.|
00000030 8d 65 98 55 b1 d9 66 cb 0e 88 bb 29 05 8d ff ed |.e.U..f....)....|
00000040 0a b8 d3 f3 76 2a 89 |....v*.|
[6df2 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6df3 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ab5b0 gate 1578074223066587500 evaluation starts
[6df4 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ab5b0 signed by 0 principal evaluation starts (used [false])
[6df5 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ab5b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6df6 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ab5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6df7 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ab5b0 principal evaluation fails
[6df8 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ab5b0 gate 1578074223066587500 evaluation fails
[6df9 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6dfa 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6dfb 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6dfc 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 4c ea 06 95 9f b5 40 7c f1 d3 37 be 5f c8 c7 |.L.....@|..7._..|
00000010 9b 86 36 52 a9 71 07 8f 78 35 a9 26 bb 07 fd fe |..6R.q..x5.&....|
[6dfd 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb b3 bb 65 30 ae 14 38 f2 8c a1 |0E.!....e0..8...|
00000010 e7 4e 7c 87 13 e3 1a 69 b6 f3 98 a6 0e de 17 3a |.N|....i.......:|
00000020 d6 00 0f d6 d1 02 20 59 61 f6 0e 49 63 d5 26 06 |...... Ya..Ic.&.|
00000030 8d 65 98 55 b1 d9 66 cb 0e 88 bb 29 05 8d ff ed |.e.U..f....)....|
00000040 0a b8 d3 f3 76 2a 89 |....v*.|
[6dfe 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6dff 01-03 17:57:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000437fe0 gate 1578074223069065600 evaluation starts
[6e00 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000437fe0 signed by 0 principal evaluation starts (used [false])
[6e01 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000437fe0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6e02 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000437fe0 principal evaluation succeeds for identity 0
[6e03 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000437fe0 gate 1578074223069065600 evaluation succeeds
[6e04 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6e05 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6e06 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6e07 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6e08 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6e09 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes]}
[6e0a 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80
[6e0b 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80
[6e0c 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6e0d 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e0e 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e0f 01-03 17:57:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e10 01-03 17:57:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6e11 01-03 17:57:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6e12 01-03 17:57:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e13 01-03 17:57:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6e14 01-03 17:57:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e15 01-03 17:57:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e16 01-03 17:57:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e17 01-03 17:57:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e18 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e19 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e1a 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e1b 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6e1c 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e1d 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e1e 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6e1f 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6e20 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e21 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6e22 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e23 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6e24 01-03 17:57:03.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e25 01-03 17:57:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6e26 01-03 17:57:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e27 01-03 17:57:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[6e28 01-03 17:57:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315104D
[6e29 01-03 17:57:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0460E38DBCEB034971584B3A2CB60AA190A7B027A7D6315002F211D825D48B47
[6e2a 01-03 17:57:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[6e2b 01-03 17:57:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[6e2c 01-03 17:57:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[6e2d 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e2e 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e2f 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e30 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6e31 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[6e32 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e33 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6e34 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6e35 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e36 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6e37 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e38 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6e39 01-03 17:57:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e3a 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6e3b 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6e3c 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e3d 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6e3e 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[6e3f 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 60 e3 8d bc eb 03 49 71 58 4b 3a 2c b6 0a a1 |.`.....IqXK:,...|
00000010 90 a7 b0 27 a7 d6 31 50 02 f2 11 d8 25 d4 8b 47 |...'..1P....%..G|
[6e40 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 6f 7d 8d 0b da bd 2b d8 c6 21 8e |0D. &o}....+..!.|
00000010 6d 46 73 c1 c7 25 6d 88 08 6b d2 09 c7 2b 8b 2e |mFs..%m..k...+..|
00000020 15 cf e2 e8 02 20 59 73 3a a6 07 1a f3 c4 00 b0 |..... Ys:.......|
00000030 94 ee cf d1 5b fc e9 97 e4 fa 72 25 a1 e6 c9 c1 |....[.....r%....|
00000040 89 ca 16 f7 3a 7c |....:||
[6e41 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6e42 01-03 17:57:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e43 01-03 17:57:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:5401665049238444437 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e44 01-03 17:57:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5401665049238444437 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e45 01-03 17:57:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[6e46 01-03 17:57:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e47 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[6e48 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e49 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[6e4a 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[6e4b 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 a8 00 73 73 23 4b 55 89 13 f7 ec 60 00 db dc |...ss#KU....`...|
00000010 e5 1d 7b e3 b8 31 8c fc 42 4c f9 0b 1d 66 31 23 |..{..1..BL...f1#|
[6e4c 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 d9 57 11 ff 36 1b 88 3d 92 67 56 |0D. ..W..6..=.gV|
00000010 60 3c 2c ab 06 f6 05 f9 20 e7 0e 8c 92 9e af a2 |`<,..... .......|
00000020 82 8d 1b 52 02 20 64 c8 c1 ab 04 5d 97 52 b1 32 |...R. d....].R.2|
00000030 98 44 03 f9 19 7d 86 4c f3 65 6a 94 87 36 c3 c4 |.D...}.L.ej..6..|
00000040 76 5c 11 97 0c 5d |v\...]|
[6e4d 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[6e4e 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df fb b4 4a 34 a1 b6 5b 3d c7 1a |0E.!....J4..[=..|
00000010 6a d5 c0 f5 2b 9c 09 9e 4c 48 34 90 d9 33 9d 6c |j...+...LH4..3.l|
00000020 22 d2 9d 01 42 02 20 2c 6f c8 27 1f ad 51 eb 4c |"...B. ,o.'..Q.L|
00000030 2f 1a fa 1d 31 20 bb 90 5f 74 e9 59 3a da d5 62 |/...1 .._t.Y:..b|
00000040 11 74 46 6f 5a b4 4a |.tFoZ.J|
[6e4f 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6e50 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[6e51 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81
[6e52 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81
[6e53 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[6e54 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e55 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e56 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e57 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[6e58 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e59 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e5a 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[6e5b 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[6e5c 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[6e5d 01-03 17:57:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e5e 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:14801201779725716363 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6e5f 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14801201779725716363 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6e60 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14801201779725716363 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6e61 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e62 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e63 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e64 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e65 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e66 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e67 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[6e68 01-03 17:57:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e69 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:6856015333220267806 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e6a 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:6856015333220267806 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e6b 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6856015333220267806 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e6c 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e6d 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e6e 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e6f 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e70 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e71 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e72 01-03 17:57:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[6e73 01-03 17:57:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e74 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6e75 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6e76 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e77 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6e78 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6e79 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e7a 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6e7b 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6e7c 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6e7d 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6e7e 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6e7f 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6e80 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 5c 10 f9 fa 64 44 66 0c e2 4d 20 f2 64 45 4e |T\...dDf..M .dEN|
00000010 bd 21 59 c3 68 82 84 c1 37 25 ce 25 61 ad 6d 40 |.!Y.h...7%.%a.m@|
[6e81 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e df 8f b0 77 97 a7 75 52 56 c9 39 |0D. ....w..uRV.9|
00000010 59 84 ec 82 9a 4a 21 1a 66 5a 7e 0f 92 d8 6c 9e |Y....J!.fZ~...l.|
00000020 92 e0 73 0d 02 20 6f 41 97 b1 60 2a 94 e4 aa 29 |..s.. oA..`*...)|
00000030 a8 8e bb c6 f2 f1 0f 80 91 ab f0 2f 38 c0 c6 49 |.........../8..I|
00000040 e2 36 46 fb 6f e4 |.6F.o.|
[6e82 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6e83 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b050 gate 1578074225146444600 evaluation starts
[6e84 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b050 signed by 0 principal evaluation starts (used [false])
[6e85 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b050 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6e86 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6e87 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b050 principal evaluation fails
[6e88 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b050 gate 1578074225146444600 evaluation fails
[6e89 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6e8a 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6e8b 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6e8c 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 5c 10 f9 fa 64 44 66 0c e2 4d 20 f2 64 45 4e |T\...dDf..M .dEN|
00000010 bd 21 59 c3 68 82 84 c1 37 25 ce 25 61 ad 6d 40 |.!Y.h...7%.%a.m@|
[6e8d 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e df 8f b0 77 97 a7 75 52 56 c9 39 |0D. ....w..uRV.9|
00000010 59 84 ec 82 9a 4a 21 1a 66 5a 7e 0f 92 d8 6c 9e |Y....J!.fZ~...l.|
00000020 92 e0 73 0d 02 20 6f 41 97 b1 60 2a 94 e4 aa 29 |..s.. oA..`*...)|
00000030 a8 8e bb c6 f2 f1 0f 80 91 ab f0 2f 38 c0 c6 49 |.........../8..I|
00000040 e2 36 46 fb 6f e4 |.6F.o.|
[6e8e 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6e8f 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b950 gate 1578074225147794500 evaluation starts
[6e90 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b950 signed by 0 principal evaluation starts (used [false])
[6e91 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b950 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6e92 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b950 principal evaluation succeeds for identity 0
[6e93 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299b950 gate 1578074225147794500 evaluation succeeds
[6e94 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6e95 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6e96 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6e97 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6e98 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[6e99 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes]}
[6e9a 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81
[6e9b 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81
[6e9c 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[6e9d 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e9e 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e9f 01-03 17:57:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ea0 01-03 17:57:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[6ea1 01-03 17:57:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ea2 01-03 17:57:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ea3 01-03 17:57:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ea4 01-03 17:57:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[6ea5 01-03 17:57:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6ea6 01-03 17:57:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6ea7 01-03 17:57:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ea8 01-03 17:57:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6ea9 01-03 17:57:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6eaa 01-03 17:57:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6eab 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6eac 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[6ead 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6eae 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6eaf 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6eb0 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6eb1 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6eb2 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6eb3 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6eb4 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 b0 ee 22 24 00 52 67 93 c1 b6 ba 0b a8 c0 72 |..."$.Rg.......r|
00000010 2d 18 c9 17 2b e7 27 4d 6b 83 51 22 8b e8 fb 9c |-...+.'Mk.Q"....|
[6eb5 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e fe f3 a1 6c 51 0a f9 70 b1 ca b9 |0D. >...lQ..p...|
00000010 a5 2a f7 13 f9 a7 69 15 c6 d3 e3 a0 fc 60 51 38 |.*....i......`Q8|
00000020 c5 cb 0f e4 02 20 5f cc 7a f5 01 9c 0d b3 88 cd |..... _.z.......|
00000030 0b 41 19 de ae 46 05 52 38 7b b9 77 80 80 b1 62 |.A...F.R8{.w...b|
00000040 8a 9d 57 41 f0 50 |..WA.P|
[6eb6 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6eb7 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9d10 gate 1578074225211863800 evaluation starts
[6eb8 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9d10 signed by 0 principal evaluation starts (used [false])
[6eb9 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9d10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6eba 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6ebb 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9d10 principal evaluation fails
[6ebc 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b9d10 gate 1578074225211863800 evaluation fails
[6ebd 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6ebe 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6ebf 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6ec0 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 b0 ee 22 24 00 52 67 93 c1 b6 ba 0b a8 c0 72 |..."$.Rg.......r|
00000010 2d 18 c9 17 2b e7 27 4d 6b 83 51 22 8b e8 fb 9c |-...+.'Mk.Q"....|
[6ec1 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e fe f3 a1 6c 51 0a f9 70 b1 ca b9 |0D. >...lQ..p...|
00000010 a5 2a f7 13 f9 a7 69 15 c6 d3 e3 a0 fc 60 51 38 |.*....i......`Q8|
00000020 c5 cb 0f e4 02 20 5f cc 7a f5 01 9c 0d b3 88 cd |..... _.z.......|
00000030 0b 41 19 de ae 46 05 52 38 7b b9 77 80 80 b1 62 |.A...F.R8{.w...b|
00000040 8a 9d 57 41 f0 50 |..WA.P|
[6ec2 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6ec3 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c660 gate 1578074225217848500 evaluation starts
[6ec4 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c660 signed by 0 principal evaluation starts (used [false])
[6ec5 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c660 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6ec6 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c660 principal evaluation succeeds for identity 0
[6ec7 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a2c660 gate 1578074225217848500 evaluation succeeds
[6ec8 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6ec9 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6eca 01-03 17:57:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6ecb 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6ecc 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[6ecd 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes]}
[6ece 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79
[6ecf 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79
[6ed0 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6ed1 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ed2 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ed3 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ed4 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[6ed5 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ed6 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ed7 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ed8 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[6ed9 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6eda 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6edb 01-03 17:57:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6edc 01-03 17:57:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[6edd 01-03 17:57:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10692097275290623764 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6ede 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[6edf 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7639302291932785171 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[6ee0 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[6ee1 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17134562613873892231 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6ee2 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17134562613873892231 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6ee3 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ee4 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10692097275290623764 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6ee5 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ee6 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7639302291932785171 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6ee7 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ee8 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7639302291932785171 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[6ee9 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7639302291932785171 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[6eea 01-03 17:57:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6eeb 01-03 17:57:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10692097275290623764 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[6eec 01-03 17:57:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10692097275290623764 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[6eed 01-03 17:57:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10692097275290623764 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[6eee 01-03 17:57:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6eef 01-03 17:57:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17134562613873892231 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[6ef0 01-03 17:57:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17134562613873892231 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[6ef1 01-03 17:57:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17134562613873892231 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[6ef2 01-03 17:57:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ef3 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ef4 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ef6 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[6ef7 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6efa 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ef5 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ef8 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6ef9 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[6efb 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6efd 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074222574618600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes to 3 peers
[6efe 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6eff 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f00 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074222574618600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6f01 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6efc 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f02 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074222574618600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6f03 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f04 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074222574618600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[6f05 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f06 01-03 17:57:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f07 01-03 17:57:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 773 bytes, Signature: 0 bytes
[6f08 01-03 17:57:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 773 bytes, Signature: 0 bytes
[6f09 01-03 17:57:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f0a 01-03 17:57:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c8 e9 e0 ed 14 3a 3d a5 b5 ee 38 5d 08 d0 78 |e.....:=...8]..x|
00000010 ba f2 9f cd c0 32 c0 45 a0 98 a3 01 0d 77 88 d0 |.....2.E.....w..|
[6f0b 01-03 17:57:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 01 64 a6 bb d6 6a 53 cf a9 d0 3d |0D. ..d...jS...=|
00000010 f6 cf 8d 17 46 40 21 93 58 3e 50 4c 42 7a db 5f |....F@!.X>PLBz._|
00000020 72 11 f3 8c 02 20 21 e5 0b 4e e9 a2 31 86 36 28 |r.... !..N..1.6(|
00000030 b6 b1 54 84 b4 5b 43 08 70 ca 8b 0c 71 72 dd b5 |..T..[C.p...qr..|
00000040 37 98 5b 59 21 28 |7.[Y!(|
[6f0c 01-03 17:57:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d e8 38 54 c5 ad 53 dd db 7f 5c c0 18 1e e7 c4 |..8T..S...\.....|
00000010 f4 db 5f 30 e4 e9 fc c0 a1 25 fe 5e 6f a6 1f cd |.._0.....%.^o...|
[6f0d 01-03 17:57:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 85 97 20 6d 8e 71 75 63 96 c5 d1 |0D. 9.. m.quc...|
00000010 2a dc 74 ab be 66 1d c8 53 7b 4f f6 b9 cc 61 f9 |*.t..f..S{O...a.|
00000020 84 17 70 f6 02 20 66 f5 a9 47 9d c9 6c c5 ca 67 |..p.. f..G..l..g|
00000030 6a 9b 44 04 44 02 26 04 13 b4 af da 49 ac 85 bb |j.D.D.&.....I...|
00000040 84 87 09 97 97 67 |.....g|
[6f0e 01-03 17:57:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f0f 01-03 17:57:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f10 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315104E
[6f11 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 497FE97F00F2927C94F2C148CB84EFA1CE28643B668A0F8583F31F90FBA1E68A
[6f12 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[6f13 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[6f14 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[6f15 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f16 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[6f17 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f18 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[6f19 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6f1a 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f1b 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[6f1c 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f1d 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6f1e 01-03 17:57:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f1f 01-03 17:57:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6f20 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6f21 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6f22 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6f23 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6f24 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6f25 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6f26 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6f27 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6f28 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f29 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b0b930 gate 1578074225424463000 evaluation starts
[6f2a 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b0b930 signed by 0 principal evaluation starts (used [false])
[6f2b 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b0b930 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6f2c 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b0b930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6f2d 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b0b930 principal evaluation fails
[6f2e 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b0b930 gate 1578074225424463000 evaluation fails
[6f2f 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6f30 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6f31 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6f32 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6f33 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6f34 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[6f35 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f36 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a98230 gate 1578074225428583900 evaluation starts
[6f37 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a98230 signed by 0 principal evaluation starts (used [false])
[6f38 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a98230 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6f39 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a98230 principal evaluation succeeds for identity 0
[6f3a 01-03 17:57:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a98230 gate 1578074225428583900 evaluation succeeds
[6f3b 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6f3c 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6f3d 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6f3e 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6f3f 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f40 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f41 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6f42 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6f43 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6f44 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6f45 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6f46 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6f47 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[6f48 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[6f49 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f4a 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a99ca0 gate 1578074225436124700 evaluation starts
[6f4b 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a99ca0 signed by 0 principal evaluation starts (used [false])
[6f4c 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a99ca0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6f4d 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a99ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6f4e 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a99ca0 principal evaluation fails
[6f4f 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a99ca0 gate 1578074225436124700 evaluation fails
[6f50 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6f51 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6f52 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6f53 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[6f54 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[6f55 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f56 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381c5a0 gate 1578074225438192000 evaluation starts
[6f57 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381c5a0 signed by 0 principal evaluation starts (used [false])
[6f58 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381c5a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6f59 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381c5a0 principal evaluation succeeds for identity 0
[6f5a 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381c5a0 gate 1578074225438192000 evaluation succeeds
[6f5b 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6f5c 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6f5d 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6f5e 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6f5f 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f60 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6f61 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6f62 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6f63 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6f64 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6f65 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[6f66 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[6f67 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f68 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d330 gate 1578074225438755200 evaluation starts
[6f69 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d330 signed by 0 principal evaluation starts (used [false])
[6f6a 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d330 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6f6b 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6f6c 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d330 principal evaluation fails
[6f6d 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d330 gate 1578074225438755200 evaluation fails
[6f6e 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6f6f 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6f70 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6f71 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[6f72 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[6f73 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f74 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381dcd0 gate 1578074225439137700 evaluation starts
[6f75 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381dcd0 signed by 0 principal evaluation starts (used [false])
[6f76 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381dcd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6f77 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381dcd0 principal evaluation succeeds for identity 0
[6f78 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381dcd0 gate 1578074225439137700 evaluation succeeds
[6f79 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6f7a 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6f7b 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6f7c 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6f7d 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f7e 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 774 bytes, Signature: 0 bytes
[6f7f 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c8 e9 e0 ed 14 3a 3d a5 b5 ee 38 5d 08 d0 78 |e.....:=...8]..x|
00000010 ba f2 9f cd c0 32 c0 45 a0 98 a3 01 0d 77 88 d0 |.....2.E.....w..|
[6f80 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 01 64 a6 bb d6 6a 53 cf a9 d0 3d |0D. ..d...jS...=|
00000010 f6 cf 8d 17 46 40 21 93 58 3e 50 4c 42 7a db 5f |....F@!.X>PLBz._|
00000020 72 11 f3 8c 02 20 21 e5 0b 4e e9 a2 31 86 36 28 |r.... !..N..1.6(|
00000030 b6 b1 54 84 b4 5b 43 08 70 ca 8b 0c 71 72 dd b5 |..T..[C.p...qr..|
00000040 37 98 5b 59 21 28 |7.[Y!(|
[6f81 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f82 01-03 17:57:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f83 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6f84 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6f85 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6f86 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6f87 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6f88 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6f89 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6f8a 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6f8b 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f8c 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a081a0 gate 1578074225443063600 evaluation starts
[6f8d 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a081a0 signed by 0 principal evaluation starts (used [false])
[6f8e 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a081a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6f8f 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a081a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6f90 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a081a0 principal evaluation fails
[6f91 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a081a0 gate 1578074225443063600 evaluation fails
[6f92 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6f93 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6f94 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6f95 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[6f96 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[6f97 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f98 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a08ba0 gate 1578074225444091200 evaluation starts
[6f99 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a08ba0 signed by 0 principal evaluation starts (used [false])
[6f9a 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a08ba0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[6f9b 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a08ba0 principal evaluation succeeds for identity 0
[6f9c 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a08ba0 gate 1578074225444091200 evaluation succeeds
[6f9d 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6f9e 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6f9f 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6fa0 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6fa1 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6fa2 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6fa3 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6fa4 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6fa5 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6fa6 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6fa7 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[6fa8 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6fa9 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6faa 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6fab 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6fac 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fad 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a447a0 gate 1578074225449453400 evaluation starts
[6fae 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a447a0 signed by 0 principal evaluation starts (used [false])
[6faf 01-03 17:57:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a447a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6fb0 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a447a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6fb1 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a447a0 principal evaluation fails
[6fb2 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a447a0 gate 1578074225449453400 evaluation fails
[6fb3 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6fb4 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6fb5 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6fb6 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 89 7b 26 17 41 8d 98 70 0a 45 ad 7b a4 46 2a |d.{&.A..p.E.{.F*|
00000010 77 45 b9 11 5d 98 02 dc 0c 5e 8d c5 53 61 8e 5f |wE..]....^..Sa._|
[6fb7 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 20 af 5b 2b 57 4d c5 eb d4 c4 |0E.!.. .[+WM....|
00000010 ce 9f 46 a4 e8 af 92 07 37 3a 81 c2 e2 94 c5 7b |..F.....7:.....{|
00000020 63 41 52 b7 a7 02 20 74 07 eb ae 54 6d c6 c2 42 |cAR... t...Tm..B|
00000030 90 90 9f 5b e0 29 fd 5c f9 45 2a 95 c7 f5 92 d0 |...[.).\.E*.....|
00000040 ff 89 c1 eb 12 d2 2c |......,|
[6fb8 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fb9 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45220 gate 1578074225454157600 evaluation starts
[6fba 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45220 signed by 0 principal evaluation starts (used [false])
[6fbb 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45220 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6fbc 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45220 principal evaluation succeeds for identity 0
[6fbd 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45220 gate 1578074225454157600 evaluation succeeds
[6fbe 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6fbf 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6fc0 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6fc1 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6fc2 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 ec 32 8b ff 2b 61 7b fc 47 09 09 d1 13 f1 94 |T.2..+a{.G......|
00000010 1c fd 10 60 27 8e 1b 5a 30 95 48 a2 e6 fd 65 d5 |...`'..Z0.H...e.|
[6fc3 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db d3 b7 c2 a3 27 6b d3 cc 8f 8a |0E.!......'k....|
00000010 cd e7 d5 48 a6 30 63 e7 de 99 77 f5 44 6d 9c ef |...H.0c...w.Dm..|
00000020 e3 91 93 bc 2a 02 20 54 d5 46 0e e4 57 34 a6 b8 |....*. T.F..W4..|
00000030 56 60 45 65 af bc 9a 40 8f c7 78 0b 4f c5 b0 44 |V`Ee...@..x.O..D|
00000040 ec b5 c9 fe 8b 1d 4b |......K|
[6fc4 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6fc5 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6fc6 01-03 17:57:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6fc7 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6fc8 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6fc9 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 ec 32 8b ff 2b 61 7b fc 47 09 09 d1 13 f1 94 |T.2..+a{.G......|
00000010 1c fd 10 60 27 8e 1b 5a 30 95 48 a2 e6 fd 65 d5 |...`'..Z0.H...e.|
[6fca 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db d3 b7 c2 a3 27 6b d3 cc 8f 8a |0E.!......'k....|
00000010 cd e7 d5 48 a6 30 63 e7 de 99 77 f5 44 6d 9c ef |...H.0c...w.Dm..|
00000020 e3 91 93 bc 2a 02 20 54 d5 46 0e e4 57 34 a6 b8 |....*. T.F..W4..|
00000030 56 60 45 65 af bc 9a 40 8f c7 78 0b 4f c5 b0 44 |V`Ee...@..x.O..D|
00000040 ec b5 c9 fe 8b 1d 4b |......K|
[6fcb 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fcc 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8590 gate 1578074225462148900 evaluation starts
[6fcd 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8590 signed by 0 principal evaluation starts (used [false])
[6fce 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8590 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[6fcf 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8590 principal evaluation succeeds for identity 0
[6fd0 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8590 gate 1578074225462148900 evaluation succeeds
[6fd1 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[6fd2 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6fd3 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6fd4 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6fd5 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6fd6 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6fd7 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6fd8 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[6fd9 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6fda 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6fdb 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6fdc 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6fdd 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6fdf 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6fde 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[6fe0 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6fe1 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6fe2 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 5c 10 f9 fa 64 44 66 0c e2 4d 20 f2 64 45 4e |T\...dDf..M .dEN|
00000010 bd 21 59 c3 68 82 84 c1 37 25 ce 25 61 ad 6d 40 |.!Y.h...7%.%a.m@|
[6fe3 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e df 8f b0 77 97 a7 75 52 56 c9 39 |0D. ....w..uRV.9|
00000010 59 84 ec 82 9a 4a 21 1a 66 5a 7e 0f 92 d8 6c 9e |Y....J!.fZ~...l.|
00000020 92 e0 73 0d 02 20 6f 41 97 b1 60 2a 94 e4 aa 29 |..s.. oA..`*...)|
00000030 a8 8e bb c6 f2 f1 0f 80 91 ab f0 2f 38 c0 c6 49 |.........../8..I|
00000040 e2 36 46 fb 6f e4 |.6F.o.|
[6fe4 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fe5 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aec6f0 gate 1578074225466324200 evaluation starts
[6fe6 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aec6f0 signed by 0 principal evaluation starts (used [false])
[6fe7 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aec6f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6fe8 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aec6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6fe9 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aec6f0 principal evaluation fails
[6fea 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aec6f0 gate 1578074225466324200 evaluation fails
[6feb 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6fec 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6fed 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6fee 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 5c 10 f9 fa 64 44 66 0c e2 4d 20 f2 64 45 4e |T\...dDf..M .dEN|
00000010 bd 21 59 c3 68 82 84 c1 37 25 ce 25 61 ad 6d 40 |.!Y.h...7%.%a.m@|
[6fef 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e df 8f b0 77 97 a7 75 52 56 c9 39 |0D. ....w..uRV.9|
00000010 59 84 ec 82 9a 4a 21 1a 66 5a 7e 0f 92 d8 6c 9e |Y....J!.fZ~...l.|
00000020 92 e0 73 0d 02 20 6f 41 97 b1 60 2a 94 e4 aa 29 |..s.. oA..`*...)|
00000030 a8 8e bb c6 f2 f1 0f 80 91 ab f0 2f 38 c0 c6 49 |.........../8..I|
00000040 e2 36 46 fb 6f e4 |.6F.o.|
[6ff0 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6ff1 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aed150 gate 1578074225466791300 evaluation starts
[6ff2 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aed150 signed by 0 principal evaluation starts (used [false])
[6ff3 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aed150 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[6ff4 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aed150 principal evaluation succeeds for identity 0
[6ff5 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aed150 gate 1578074225466791300 evaluation succeeds
[6ff6 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6ff7 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6ff8 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6ff9 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6ffa 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[6ffb 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ffc 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[6ffd 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 a8 00 73 73 23 4b 55 89 13 f7 ec 60 00 db dc |...ss#KU....`...|
00000010 e5 1d 7b e3 b8 31 8c fc 42 4c f9 0b 1d 66 31 23 |..{..1..BL...f1#|
[6ffe 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 d9 57 11 ff 36 1b 88 3d 92 67 56 |0D. ..W..6..=.gV|
00000010 60 3c 2c ab 06 f6 05 f9 20 e7 0e 8c 92 9e af a2 |`<,..... .......|
00000020 82 8d 1b 52 02 20 64 c8 c1 ab 04 5d 97 52 b1 32 |...R. d....].R.2|
00000030 98 44 03 f9 19 7d 86 4c f3 65 6a 94 87 36 c3 c4 |.D...}.L.ej..6..|
00000040 76 5c 11 97 0c 5d |v\...]|
[6fff 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[7000 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7001 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7002 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 7f e9 7f 00 f2 92 7c 94 f2 c1 48 cb 84 ef a1 |I......|...H....|
00000010 ce 28 64 3b 66 8a 0f 85 83 f3 1f 90 fb a1 e6 8a |.(d;f...........|
[7003 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 30 ae 1e 38 d4 78 2f f2 03 3f ac |0D. "0..8.x/..?.|
00000010 7d 18 3d 27 02 98 9b 51 16 40 6d 4b de ca ba 94 |}.='...Q.@mK....|
00000020 2c f2 8c 67 02 20 47 42 fc b7 f8 67 10 50 4f ad |,..g. GB...g.PO.|
00000030 ba fb e0 53 82 cc e9 32 b7 46 c5 6b 58 08 22 86 |...S...2.F.kX.".|
00000040 f3 0a 2a b3 8b 06 |..*...|
[7004 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[7005 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[7006 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7007 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7008 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[7009 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[700a 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 7f e9 7f 00 f2 92 7c 94 f2 c1 48 cb 84 ef a1 |I......|...H....|
00000010 ce 28 64 3b 66 8a 0f 85 83 f3 1f 90 fb a1 e6 8a |.(d;f...........|
[700b 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 30 ae 1e 38 d4 78 2f f2 03 3f ac |0D. "0..8.x/..?.|
00000010 7d 18 3d 27 02 98 9b 51 16 40 6d 4b de ca ba 94 |}.='...Q.@mK....|
00000020 2c f2 8c 67 02 20 47 42 fc b7 f8 67 10 50 4f ad |,..g. GB...g.PO.|
00000030 ba fb e0 53 82 cc e9 32 b7 46 c5 6b 58 08 22 86 |...S...2.F.kX.".|
00000040 f3 0a 2a b3 8b 06 |..*...|
[700c 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[700d 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[700e 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 4f 13 36 84 5a 85 aa 2b 97 13 e8 |0D. .O.6.Z..+...|
00000010 1b 80 16 9f c2 c3 34 bb e0 41 16 1b 64 eb f2 4c |......4..A..d..L|
00000020 ad 26 f6 50 02 20 4b cd 45 e4 4c 1e b4 be 66 45 |.&.P. K.E.L...fE|
00000030 88 8e 77 14 c8 e9 5a 03 bd 26 c6 72 60 30 31 91 |..w...Z..&.r`01.|
00000040 d0 65 b8 6d 8c 14 |.e.m..|
[700f 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[7010 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7011 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7012 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7013 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7014 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7015 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c8 e9 e0 ed 14 3a 3d a5 b5 ee 38 5d 08 d0 78 |e.....:=...8]..x|
00000010 ba f2 9f cd c0 32 c0 45 a0 98 a3 01 0d 77 88 d0 |.....2.E.....w..|
[7016 01-03 17:57:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 01 64 a6 bb d6 6a 53 cf a9 d0 3d |0D. ..d...jS...=|
00000010 f6 cf 8d 17 46 40 21 93 58 3e 50 4c 42 7a db 5f |....F@!.X>PLBz._|
00000020 72 11 f3 8c 02 20 21 e5 0b 4e e9 a2 31 86 36 28 |r.... !..N..1.6(|
00000030 b6 b1 54 84 b4 5b 43 08 70 ca 8b 0c 71 72 dd b5 |..T..[C.p...qr..|
00000040 37 98 5b 59 21 28 |7.[Y!(|
[7017 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d e8 38 54 c5 ad 53 dd db 7f 5c c0 18 1e e7 c4 |..8T..S...\.....|
00000010 f4 db 5f 30 e4 e9 fc c0 a1 25 fe 5e 6f a6 1f cd |.._0.....%.^o...|
[7018 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 85 97 20 6d 8e 71 75 63 96 c5 d1 |0D. 9.. m.quc...|
00000010 2a dc 74 ab be 66 1d c8 53 7b 4f f6 b9 cc 61 f9 |*.t..f..S{O...a.|
00000020 84 17 70 f6 02 20 66 f5 a9 47 9d c9 6c c5 ca 67 |..p.. f..G..l..g|
00000030 6a 9b 44 04 44 02 26 04 13 b4 af da 49 ac 85 bb |j.D.D.&.....I...|
00000040 84 87 09 97 97 67 |.....g|
[7019 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[701a 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[701b 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[701c 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[701d 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[701e 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[701f 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7020 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7021 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[7022 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[7023 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7024 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9d660 gate 1578074225473823500 evaluation starts
[7025 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9d660 signed by 0 principal evaluation starts (used [false])
[7026 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9d660 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7027 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9d660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7028 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9d660 principal evaluation fails
[7029 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9d660 gate 1578074225473823500 evaluation fails
[702a 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[702b 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[702c 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[702d 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 59 fa 64 5c 5a e3 a0 09 58 43 64 75 92 4f b9 |.Y.d\Z...XCdu.O.|
00000010 88 3f 94 5f e2 7b f8 68 fb e6 89 bb 8b 53 7c 25 |.?._.{.h.....S|%|
[702e 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c8 e9 31 80 ac 14 4f d7 fb 82 |0E.!....1...O...|
00000010 57 4c 1b be 18 12 76 44 00 3d 01 60 8d 7b 4e b1 |WL....vD.=.`.{N.|
00000020 9c 32 fc 44 26 02 20 4a e0 27 0c 78 93 ca d2 9d |.2.D&. J.'.x....|
00000030 28 59 fc 04 39 f7 63 95 39 ea aa 99 c9 a1 65 ac |(Y..9.c.9.....e.|
00000040 10 10 14 6c a3 2b 7f |...l.+.|
[702f 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7030 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9df60 gate 1578074225477566800 evaluation starts
[7031 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9df60 signed by 0 principal evaluation starts (used [false])
[7032 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9df60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7033 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9df60 principal evaluation succeeds for identity 0
[7034 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9df60 gate 1578074225477566800 evaluation succeeds
[7035 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7036 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7037 01-03 17:57:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7038 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7039 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[703a 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[703b 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[703c 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[703d 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[703e 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[703f 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7040 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7041 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[7042 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[7043 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7044 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3a70 gate 1578074225483900400 evaluation starts
[7045 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3a70 signed by 0 principal evaluation starts (used [false])
[7046 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3a70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7047 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7048 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3a70 principal evaluation fails
[7049 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd3a70 gate 1578074225483900400 evaluation fails
[704a 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[704b 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[704c 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[704d 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[704e 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[704f 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7050 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfc3e0 gate 1578074225485791800 evaluation starts
[7051 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfc3e0 signed by 0 principal evaluation starts (used [false])
[7052 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfc3e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7053 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfc3e0 principal evaluation succeeds for identity 0
[7054 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfc3e0 gate 1578074225485791800 evaluation succeeds
[7055 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7056 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7057 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7058 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7059 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[705a 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[705b 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[705c 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[705d 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[705e 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[705f 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[7060 01-03 17:57:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[7061 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7062 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd2d0 gate 1578074225490244800 evaluation starts
[7063 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd2d0 signed by 0 principal evaluation starts (used [false])
[7064 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd2d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7065 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd2d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7066 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd2d0 principal evaluation fails
[7067 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd2d0 gate 1578074225490244800 evaluation fails
[7068 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7069 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[706a 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[706b 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[706c 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[706d 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[706e 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfdbd0 gate 1578074225492624100 evaluation starts
[706f 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfdbd0 signed by 0 principal evaluation starts (used [false])
[7070 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfdbd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7071 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfdbd0 principal evaluation succeeds for identity 0
[7072 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfdbd0 gate 1578074225492624100 evaluation succeeds
[7073 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7074 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7075 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7076 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7077 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7078 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7079 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[707a 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[707b 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[707c 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[707d 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[707e 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[707f 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7080 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7081 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7082 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7083 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 b0 ee 22 24 00 52 67 93 c1 b6 ba 0b a8 c0 72 |..."$.Rg.......r|
00000010 2d 18 c9 17 2b e7 27 4d 6b 83 51 22 8b e8 fb 9c |-...+.'Mk.Q"....|
[7084 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e fe f3 a1 6c 51 0a f9 70 b1 ca b9 |0D. >...lQ..p...|
00000010 a5 2a f7 13 f9 a7 69 15 c6 d3 e3 a0 fc 60 51 38 |.*....i......`Q8|
00000020 c5 cb 0f e4 02 20 5f cc 7a f5 01 9c 0d b3 88 cd |..... _.z.......|
00000030 0b 41 19 de ae 46 05 52 38 7b b9 77 80 80 b1 62 |.A...F.R8{.w...b|
00000040 8a 9d 57 41 f0 50 |..WA.P|
[7085 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7086 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5b8f0 gate 1578074225498139500 evaluation starts
[7087 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5b8f0 signed by 0 principal evaluation starts (used [false])
[7088 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5b8f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7089 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5b8f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[708a 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5b8f0 principal evaluation fails
[708b 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5b8f0 gate 1578074225498139500 evaluation fails
[708c 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[708d 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[708e 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[708f 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 b0 ee 22 24 00 52 67 93 c1 b6 ba 0b a8 c0 72 |..."$.Rg.......r|
00000010 2d 18 c9 17 2b e7 27 4d 6b 83 51 22 8b e8 fb 9c |-...+.'Mk.Q"....|
[7090 01-03 17:57:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e fe f3 a1 6c 51 0a f9 70 b1 ca b9 |0D. >...lQ..p...|
00000010 a5 2a f7 13 f9 a7 69 15 c6 d3 e3 a0 fc 60 51 38 |.*....i......`Q8|
00000020 c5 cb 0f e4 02 20 5f cc 7a f5 01 9c 0d b3 88 cd |..... _.z.......|
00000030 0b 41 19 de ae 46 05 52 38 7b b9 77 80 80 b1 62 |.A...F.R8{.w...b|
00000040 8a 9d 57 41 f0 50 |..WA.P|
[7091 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7092 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d941f0 gate 1578074225500521000 evaluation starts
[7093 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d941f0 signed by 0 principal evaluation starts (used [false])
[7094 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d941f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7095 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d941f0 principal evaluation succeeds for identity 0
[7096 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d941f0 gate 1578074225500521000 evaluation succeeds
[7097 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7098 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7099 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[709a 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[709b 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[709c 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[709d 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[709e 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 7f e9 7f 00 f2 92 7c 94 f2 c1 48 cb 84 ef a1 |I......|...H....|
00000010 ce 28 64 3b 66 8a 0f 85 83 f3 1f 90 fb a1 e6 8a |.(d;f...........|
[709f 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 30 ae 1e 38 d4 78 2f f2 03 3f ac |0D. "0..8.x/..?.|
00000010 7d 18 3d 27 02 98 9b 51 16 40 6d 4b de ca ba 94 |}.='...Q.@mK....|
00000020 2c f2 8c 67 02 20 47 42 fc b7 f8 67 10 50 4f ad |,..g. GB...g.PO.|
00000030 ba fb e0 53 82 cc e9 32 b7 46 c5 6b 58 08 22 86 |...S...2.F.kX.".|
00000040 f3 0a 2a b3 8b 06 |..*...|
[70a0 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[70a1 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[70a2 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70a3 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[70a4 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 a8 00 73 73 23 4b 55 89 13 f7 ec 60 00 db dc |...ss#KU....`...|
00000010 e5 1d 7b e3 b8 31 8c fc 42 4c f9 0b 1d 66 31 23 |..{..1..BL...f1#|
[70a5 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 d9 57 11 ff 36 1b 88 3d 92 67 56 |0D. ..W..6..=.gV|
00000010 60 3c 2c ab 06 f6 05 f9 20 e7 0e 8c 92 9e af a2 |`<,..... .......|
00000020 82 8d 1b 52 02 20 64 c8 c1 ab 04 5d 97 52 b1 32 |...R. d....].R.2|
00000030 98 44 03 f9 19 7d 86 4c f3 65 6a 94 87 36 c3 c4 |.D...}.L.ej..6..|
00000040 76 5c 11 97 0c 5d |v\...]|
[70a6 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[70a7 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70a8 01-03 17:57:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70a9 01-03 17:57:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70aa 01-03 17:57:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70ab 01-03 17:57:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[70ac 01-03 17:57:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70ad 01-03 17:57:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70ae 01-03 17:57:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5782164341315804228 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[70af 01-03 17:57:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5782164341315804228 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[70b0 01-03 17:57:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70b1 01-03 17:57:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 5782164341315804228 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6], Envelope: 51 bytes, Signature: 0 bytes
[70b2 01-03 17:57:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 5782164341315804228 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6], Envelope: 51 bytes, Signature: 0 bytes
[70b3 01-03 17:57:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70b4 01-03 17:57:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074222646623800 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[70b5 01-03 17:57:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 ec 32 8b ff 2b 61 7b fc 47 09 09 d1 13 f1 94 |T.2..+a{.G......|
00000010 1c fd 10 60 27 8e 1b 5a 30 95 48 a2 e6 fd 65 d5 |...`'..Z0.H...e.|
[70b6 01-03 17:57:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db d3 b7 c2 a3 27 6b d3 cc 8f 8a |0E.!......'k....|
00000010 cd e7 d5 48 a6 30 63 e7 de 99 77 f5 44 6d 9c ef |...H.0c...w.Dm..|
00000020 e3 91 93 bc 2a 02 20 54 d5 46 0e e4 57 34 a6 b8 |....*. T.F..W4..|
00000030 56 60 45 65 af bc 9a 40 8f c7 78 0b 4f c5 b0 44 |V`Ee...@..x.O..D|
00000040 ec b5 c9 fe 8b 1d 4b |......K|
[70b7 01-03 17:57:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70b8 01-03 17:57:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[70b9 01-03 17:57:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70ba 01-03 17:57:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70bb 01-03 17:57:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70bc 01-03 17:57:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074222646623800 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[70bd 01-03 17:57:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074222646623800 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[70be 01-03 17:57:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 ec 32 8b ff 2b 61 7b fc 47 09 09 d1 13 f1 94 |T.2..+a{.G......|
00000010 1c fd 10 60 27 8e 1b 5a 30 95 48 a2 e6 fd 65 d5 |...`'..Z0.H...e.|
[70bf 01-03 17:57:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db d3 b7 c2 a3 27 6b d3 cc 8f 8a |0E.!......'k....|
00000010 cd e7 d5 48 a6 30 63 e7 de 99 77 f5 44 6d 9c ef |...H.0c...w.Dm..|
00000020 e3 91 93 bc 2a 02 20 54 d5 46 0e e4 57 34 a6 b8 |....*. T.F..W4..|
00000030 56 60 45 65 af bc 9a 40 8f c7 78 0b 4f c5 b0 44 |V`Ee...@..x.O..D|
00000040 ec b5 c9 fe 8b 1d 4b |......K|
[70c0 01-03 17:57:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70c1 01-03 17:57:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70c2 01-03 17:57:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074222646623800 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[70c3 01-03 17:57:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074222646623800 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[70c4 01-03 17:57:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 ec 32 8b ff 2b 61 7b fc 47 09 09 d1 13 f1 94 |T.2..+a{.G......|
00000010 1c fd 10 60 27 8e 1b 5a 30 95 48 a2 e6 fd 65 d5 |...`'..Z0.H...e.|
[70c5 01-03 17:57:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db d3 b7 c2 a3 27 6b d3 cc 8f 8a |0E.!......'k....|
00000010 cd e7 d5 48 a6 30 63 e7 de 99 77 f5 44 6d 9c ef |...H.0c...w.Dm..|
00000020 e3 91 93 bc 2a 02 20 54 d5 46 0e e4 57 34 a6 b8 |....*. T.F..W4..|
00000030 56 60 45 65 af bc 9a 40 8f c7 78 0b 4f c5 b0 44 |V`Ee...@..x.O..D|
00000040 ec b5 c9 fe 8b 1d 4b |......K|
[70c6 01-03 17:57:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70c7 01-03 17:57:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70c8 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57596
[70c9 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[70ca 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3 creator is valid
[70cb 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 a6 b9 15 af 7f ae df 5b da 15 63 ab cf c1 80 |7.......[..c....|
00000010 b3 df 8f 24 8a 2b 5d 42 58 56 47 25 54 11 b3 d4 |...$.+]BXVG%T...|
[70cc 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 ca 17 fd 58 ad ae c1 b4 25 08 7c |0D. %...X....%.||
00000010 4b f2 ba 49 26 b0 15 c0 6e 2b 3c 12 ac 7c 49 39 |K..I&...n+<..|I9|
00000020 6a a4 e6 47 02 20 30 01 8d bd f5 94 17 e9 a2 56 |j..G. 0........V|
00000030 d2 f7 29 6a 20 c8 8e d7 f2 42 6c 52 62 c6 57 d6 |..)j ....BlRb.W.|
00000040 7e dc c0 13 49 70 |~...Ip|
[70cd 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3 signature is valid
[70ce 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9ae6ca3d] processing txid: 9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3
[70cf 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3]
[70d0 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x39, 0x61, 0x65, 0x36, 0x63, 0x61, 0x33, 0x64, 0x37, 0x37, 0x34, 0x63, 0x63, 0x31, 0x65, 0x36, 0x32, 0x38, 0x63, 0x63, 0x34, 0x36, 0x37, 0x66, 0x66, 0x62, 0x32, 0x66, 0x33, 0x36, 0x61, 0x39, 0x30, 0x61, 0x38, 0x39, 0x62, 0x65, 0x63, 0x34, 0x62, 0x65, 0x64, 0x66, 0x66, 0x34, 0x37, 0x62, 0x65, 0x65, 0x61, 0x62, 0x61, 0x61, 0x61, 0x36, 0x38, 0x63, 0x33, 0x62, 0x32, 0x63, 0x62, 0x33}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x39, 0x61, 0x65, 0x36, 0x63, 0x61, 0x33, 0x64, 0x37, 0x37, 0x34, 0x63, 0x63, 0x31, 0x65, 0x36, 0x32, 0x38, 0x63, 0x63, 0x34, 0x36, 0x37, 0x66, 0x66, 0x62, 0x32, 0x66, 0x33, 0x36, 0x61, 0x39, 0x30, 0x61, 0x38, 0x39, 0x62, 0x65, 0x63, 0x34, 0x62, 0x65, 0x64, 0x66, 0x66, 0x34, 0x37, 0x62, 0x65, 0x65, 0x61, 0x62, 0x61, 0x61, 0x61, 0x36, 0x38, 0x63, 0x33, 0x62, 0x32, 0x63, 0x62, 0x33, 0xff}]
[70d1 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[70d2 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[70d3 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[70d4 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[70d5 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[70d6 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 a6 b9 15 af 7f ae df 5b da 15 63 ab cf c1 80 |7.......[..c....|
00000010 b3 df 8f 24 8a 2b 5d 42 58 56 47 25 54 11 b3 d4 |...$.+]BXVG%T...|
[70d7 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 ca 17 fd 58 ad ae c1 b4 25 08 7c |0D. %...X....%.||
00000010 4b f2 ba 49 26 b0 15 c0 6e 2b 3c 12 ac 7c 49 39 |K..I&...n+<..|I9|
00000020 6a a4 e6 47 02 20 30 01 8d bd f5 94 17 e9 a2 56 |j..G. 0........V|
00000030 d2 f7 29 6a 20 c8 8e d7 f2 42 6c 52 62 c6 57 d6 |..)j ....BlRb.W.|
00000040 7e dc c0 13 49 70 |~...Ip|
[70d8 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[70d9 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042704b0 gate 1578074225764752900 evaluation starts
[70da 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042704b0 signed by 0 principal evaluation starts (used [false])
[70db 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042704b0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[70dc 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042704b0 principal evaluation succeeds for identity 0
[70dd 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042704b0 gate 1578074225764752900 evaluation succeeds
[70de 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[70df 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[70e0 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[70e1 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[70e2 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[70e3 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3]
[70e4 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[70e5 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9ae6ca3d] Entry chaincode: exp02
[70e6 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9ae6ca3d] Entry chaincode: exp02
[70e7 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [9ae6ca3d] getting chaincode data for exp02 on channel businesschannel
[70e8 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[70e9 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[70ea 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[70eb 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [9ae6ca3d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[70ec 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [9ae6ca3d] handling GET_STATE from chaincode
[70ed 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [9ae6ca3d] getting state for chaincode exp02, key a, channel businesschannel
[70ee 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[70ef 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [9ae6ca3d] Completed GET_STATE. Sending RESPONSE
[70f0 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [9ae6ca3d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[70f1 01-03 17:57:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU [9ae6ca3d] notifying Txid:9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3, channelID:businesschannel
[70f2 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[70f3 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9ae6ca3d] Exit chaincode: exp02 (3ms)
[70f4 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[70f5 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3]
[70f6 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9ae6ca3d] Exit
[70f7 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9ae6ca3d] escc for chaincode exp02 is escc
[70f8 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A208BA0496F9BAF2D31E6BC8FE85F06...455254494649434154452D2D2D2D2D0A
[70f9 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EC17F8566F06EC82802CD60D53D56EC3581AC24A9C56C2BAEB12D30DAD8C67C3
[70fa 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9ae6ca3d774cc1e628cc467ffb2f36a90a89bec4bedff47beeabaaa68c3b2cb3]
[70fb 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57596
[70fc 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57596 grpc.code=OK grpc.call_duration=10.419ms
[70fd 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[70fe 01-03 17:57:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[70ff 01-03 17:57:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8036153282394467061 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[7100 01-03 17:57:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8036153282394467061 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[7101 01-03 17:57:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7102 01-03 17:57:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7103 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57600
[7104 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[7105 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794 creator is valid
[7106 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 39 08 ab 3d fa 61 e0 98 71 50 31 4f 35 2e 38 |*9..=.a..qP1O5.8|
00000010 59 4e 32 3d c4 06 de 12 33 5a c0 e7 78 ec 95 54 |YN2=....3Z..x..T|
[7107 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 72 3a 44 25 82 cc d4 f6 d9 5e 2e |0D. Ar:D%.....^.|
00000010 f1 3c ce d0 71 5c c9 8a 1c 89 b4 73 28 d7 45 f6 |.<..q\.....s(.E.|
00000020 51 da d1 e5 02 20 71 15 21 64 15 f6 e4 86 d6 fb |Q.... q.!d......|
00000030 d5 63 97 23 41 4f 29 e8 15 42 c6 d8 49 81 4a 0e |.c.#AO)..B..I.J.|
00000040 7a 3f f8 50 4d 18 |z?.PM.|
[7108 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794 signature is valid
[7109 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c64a6fbb] processing txid: c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794
[710a 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794]
[710b 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x36, 0x34, 0x61, 0x36, 0x66, 0x62, 0x62, 0x64, 0x37, 0x31, 0x62, 0x32, 0x33, 0x32, 0x65, 0x37, 0x36, 0x63, 0x32, 0x33, 0x32, 0x39, 0x65, 0x35, 0x63, 0x37, 0x35, 0x62, 0x65, 0x61, 0x30, 0x37, 0x32, 0x63, 0x62, 0x66, 0x30, 0x37, 0x63, 0x38, 0x65, 0x33, 0x32, 0x35, 0x66, 0x61, 0x34, 0x61, 0x37, 0x31, 0x61, 0x33, 0x32, 0x62, 0x66, 0x32, 0x31, 0x31, 0x39, 0x37, 0x37, 0x39, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x36, 0x34, 0x61, 0x36, 0x66, 0x62, 0x62, 0x64, 0x37, 0x31, 0x62, 0x32, 0x33, 0x32, 0x65, 0x37, 0x36, 0x63, 0x32, 0x33, 0x32, 0x39, 0x65, 0x35, 0x63, 0x37, 0x35, 0x62, 0x65, 0x61, 0x30, 0x37, 0x32, 0x63, 0x62, 0x66, 0x30, 0x37, 0x63, 0x38, 0x65, 0x33, 0x32, 0x35, 0x66, 0x61, 0x34, 0x61, 0x37, 0x31, 0x61, 0x33, 0x32, 0x62, 0x66, 0x32, 0x31, 0x31, 0x39, 0x37, 0x37, 0x39, 0x34, 0xff}]
[710c 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[710d 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[710e 01-03 17:57:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[710f 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7110 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[7111 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 39 08 ab 3d fa 61 e0 98 71 50 31 4f 35 2e 38 |*9..=.a..qP1O5.8|
00000010 59 4e 32 3d c4 06 de 12 33 5a c0 e7 78 ec 95 54 |YN2=....3Z..x..T|
[7112 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 72 3a 44 25 82 cc d4 f6 d9 5e 2e |0D. Ar:D%.....^.|
00000010 f1 3c ce d0 71 5c c9 8a 1c 89 b4 73 28 d7 45 f6 |.<..q\.....s(.E.|
00000020 51 da d1 e5 02 20 71 15 21 64 15 f6 e4 86 d6 fb |Q.... q.!d......|
00000030 d5 63 97 23 41 4f 29 e8 15 42 c6 d8 49 81 4a 0e |.c.#AO)..B..I.J.|
00000040 7a 3f f8 50 4d 18 |z?.PM.|
[7113 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7114 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155f10 gate 1578074225951208400 evaluation starts
[7115 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155f10 signed by 0 principal evaluation starts (used [false])
[7116 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155f10 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[7117 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155f10 principal evaluation succeeds for identity 0
[7118 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155f10 gate 1578074225951208400 evaluation succeeds
[7119 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[711a 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[711b 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[711c 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[711d 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[711e 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794]
[711f 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7120 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c64a6fbb] Entry chaincode: exp02
[7121 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c64a6fbb] Entry chaincode: exp02
[7122 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] getting chaincode data for exp02 on channel businesschannel
[7123 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7124 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[7125 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7126 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[7127 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] handling GET_STATE from chaincode
[7128 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] getting state for chaincode exp02, key a, channel businesschannel
[7129 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[712a 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Completed GET_STATE. Sending RESPONSE
[712b 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[712c 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] handling GET_STATE from chaincode
[712d 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] getting state for chaincode exp02, key b, channel businesschannel
[712e 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b
[712f 01-03 17:57:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Completed GET_STATE. Sending RESPONSE
[7130 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[7131 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] handling PUT_STATE from chaincode
[7132 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Completed PUT_STATE. Sending RESPONSE
[7133 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[7134 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] handling PUT_STATE from chaincode
[7135 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Completed PUT_STATE. Sending RESPONSE
[7136 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7137 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [c64a6fbb] notifying Txid:c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794, channelID:businesschannel
[7138 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7139 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c64a6fbb] Exit chaincode: exp02 (9ms)
[713a 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[713b 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794]
[713c 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c64a6fbb] Exit
[713d 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c64a6fbb] escc for chaincode exp02 is escc
[713e 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2000A32EBBA7417497C251DCCBDA13...455254494649434154452D2D2D2D2D0A
[713f 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 900A237D41FC1FF5C2A5F6AADCE47CA212D1444871128FA74EA493AC208DF803
[7140 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794]
[7141 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57600
[7142 01-03 17:57:05.96 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57600 grpc.code=OK grpc.call_duration=18.5636ms
[7143 01-03 17:57:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7144 01-03 17:57:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:57600: read: connection reset by peer
[7145 01-03 17:57:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7146 01-03 17:57:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[7147 01-03 17:57:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074222626117100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[7148 01-03 17:57:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[7149 01-03 17:57:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[714a 01-03 17:57:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[714b 01-03 17:57:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[714c 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[714d 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074222626117100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[714e 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[714f 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7150 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7151 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7152 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7153 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7154 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7155 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[7156 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[7157 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7158 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd390 gate 1578074226105101200 evaluation starts
[7159 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd390 signed by 0 principal evaluation starts (used [false])
[715a 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd390 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[715b 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[715c 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd390 principal evaluation fails
[715d 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd390 gate 1578074226105101200 evaluation fails
[715e 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[715f 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7160 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7161 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[7162 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[7163 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7164 01-03 17:57:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdd90 gate 1578074226109062300 evaluation starts
[7165 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdd90 signed by 0 principal evaluation starts (used [false])
[7166 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdd90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7167 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdd90 principal evaluation succeeds for identity 0
[7168 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdd90 gate 1578074226109062300 evaluation succeeds
[7169 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[716a 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[716b 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[716c 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[716d 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[716e 01-03 17:57:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[716f 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074222626117100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[7170 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074222626117100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[7171 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7172 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7173 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7174 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7175 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7176 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7177 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7178 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[7179 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[717a 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[717b 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dfb00 gate 1578074226124534700 evaluation starts
[717c 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dfb00 signed by 0 principal evaluation starts (used [false])
[717d 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dfb00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[717e 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dfb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[717f 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dfb00 principal evaluation fails
[7180 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dfb00 gate 1578074226124534700 evaluation fails
[7181 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7182 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7183 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7184 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[7185 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[7186 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7187 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004440410 gate 1578074226125344600 evaluation starts
[7188 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004440410 signed by 0 principal evaluation starts (used [false])
[7189 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004440410 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[718a 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004440410 principal evaluation succeeds for identity 0
[718b 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004440410 gate 1578074226125344600 evaluation succeeds
[718c 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[718d 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[718e 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[718f 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7190 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7191 01-03 17:57:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7192 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57606
[7193 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[7194 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c creator is valid
[7195 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 15 e5 88 ee 65 4d e5 42 fa 82 b3 ae 9a 86 55 |V....eM.B......U|
00000010 a0 b4 03 31 2c c0 e1 a7 16 e7 6f 7f aa 48 71 3e |...1,.....o..Hq>|
[7196 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9c 34 60 47 82 62 90 ac 74 23 |0E.!...4`G.b..t#|
00000010 c9 8f 3f ea 9c cb 8c 41 b2 8f bb f1 22 a9 3f db |..?....A....".?.|
00000020 8a 71 2a c5 16 02 20 58 fd 5c bb 68 69 ff 0b 70 |.q*... X.\.hi..p|
00000030 e5 a1 f3 e3 c7 5f 92 df fb 36 76 9e 7f 76 26 18 |....._...6v..v&.|
00000040 24 ba 07 ac 0c e5 a2 |$......|
[7197 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c signature is valid
[7198 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfeb453] processing txid: abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c
[7199 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c]
[719a 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x61, 0x62, 0x66, 0x65, 0x62, 0x34, 0x35, 0x33, 0x38, 0x39, 0x62, 0x66, 0x31, 0x63, 0x65, 0x32, 0x34, 0x30, 0x37, 0x34, 0x65, 0x61, 0x62, 0x31, 0x35, 0x30, 0x35, 0x37, 0x34, 0x32, 0x38, 0x35, 0x38, 0x61, 0x64, 0x36, 0x35, 0x37, 0x38, 0x31, 0x38, 0x62, 0x63, 0x62, 0x33, 0x66, 0x35, 0x36, 0x34, 0x31, 0x63, 0x63, 0x39, 0x38, 0x61, 0x31, 0x31, 0x65, 0x35, 0x38, 0x32, 0x62, 0x32, 0x63}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x61, 0x62, 0x66, 0x65, 0x62, 0x34, 0x35, 0x33, 0x38, 0x39, 0x62, 0x66, 0x31, 0x63, 0x65, 0x32, 0x34, 0x30, 0x37, 0x34, 0x65, 0x61, 0x62, 0x31, 0x35, 0x30, 0x35, 0x37, 0x34, 0x32, 0x38, 0x35, 0x38, 0x61, 0x64, 0x36, 0x35, 0x37, 0x38, 0x31, 0x38, 0x62, 0x63, 0x62, 0x33, 0x66, 0x35, 0x36, 0x34, 0x31, 0x63, 0x63, 0x39, 0x38, 0x61, 0x31, 0x31, 0x65, 0x35, 0x38, 0x32, 0x62, 0x32, 0x63, 0xff}]
[719b 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[719c 01-03 17:57:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[719d 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[719e 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[719f 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[71a0 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 15 e5 88 ee 65 4d e5 42 fa 82 b3 ae 9a 86 55 |V....eM.B......U|
00000010 a0 b4 03 31 2c c0 e1 a7 16 e7 6f 7f aa 48 71 3e |...1,.....o..Hq>|
[71a1 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9c 34 60 47 82 62 90 ac 74 23 |0E.!...4`G.b..t#|
00000010 c9 8f 3f ea 9c cb 8c 41 b2 8f bb f1 22 a9 3f db |..?....A....".?.|
00000020 8a 71 2a c5 16 02 20 58 fd 5c bb 68 69 ff 0b 70 |.q*... X.\.hi..p|
00000030 e5 a1 f3 e3 c7 5f 92 df fb 36 76 9e 7f 76 26 18 |....._...6v..v&.|
00000040 24 ba 07 ac 0c e5 a2 |$......|
[71a2 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[71a3 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e1c0 gate 1578074226221029400 evaluation starts
[71a4 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e1c0 signed by 0 principal evaluation starts (used [false])
[71a5 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e1c0 processing identity 0 - &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[71a6 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[71a7 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e1c0 principal evaluation fails
[71a8 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449e1c0 gate 1578074226221029400 evaluation fails
[71a9 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers
[71aa 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[71ab 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==
[71ac 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 15 e5 88 ee 65 4d e5 42 fa 82 b3 ae 9a 86 55 |V....eM.B......U|
00000010 a0 b4 03 31 2c c0 e1 a7 16 e7 6f 7f aa 48 71 3e |...1,.....o..Hq>|
[71ad 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 9c 34 60 47 82 62 90 ac 74 23 |0E.!...4`G.b..t#|
00000010 c9 8f 3f ea 9c cb 8c 41 b2 8f bb f1 22 a9 3f db |..?....A....".?.|
00000020 8a 71 2a c5 16 02 20 58 fd 5c bb 68 69 ff 0b 70 |.q*... X.\.hi..p|
00000030 e5 a1 f3 e3 c7 5f 92 df fb 36 76 9e 7f 76 26 18 |....._...6v..v&.|
00000040 24 ba 07 ac 0c e5 a2 |$......|
[71ae 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[71af 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449eb20 gate 1578074226224219500 evaluation starts
[71b0 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449eb20 signed by 0 principal evaluation starts (used [false])
[71b1 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449eb20 processing identity 0 - &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[71b2 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[71b3 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[71b4 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449eb20 principal evaluation succeeds for identity 0
[71b5 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449eb20 gate 1578074226224219500 evaluation succeeds
[71b6 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers
[71b7 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers
[71b8 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[71b9 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[71ba 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[71bb 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c]
[71bc 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[71bd 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfeb453] Entry chaincode: exp02
[71be 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][abfeb453] Entry chaincode: exp02
[71bf 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU [abfeb453] getting chaincode data for exp02 on channel businesschannel
[71c0 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[71c1 01-03 17:57:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[71c2 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[71c3 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU [abfeb453] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[71c4 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU [abfeb453] handling GET_STATE from chaincode
[71c5 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU [abfeb453] getting state for chaincode exp02, key a, channel businesschannel
[71c6 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[71c7 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU [abfeb453] Completed GET_STATE. Sending RESPONSE
[71c8 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU [abfeb453] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[71c9 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU [abfeb453] notifying Txid:abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c, channelID:businesschannel
[71ca 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[71cb 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][abfeb453] Exit chaincode: exp02 (5ms)
[71cc 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[71cd 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c]
[71ce 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfeb453] Exit
[71cf 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfeb453] escc for chaincode exp02 is escc
[71d0 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2042DF15DC418056FBB5D8CC342901...455254494649434154452D2D2D2D2D0A
[71d1 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1E4ADFBCB97C859ECBB7B6BE5C5DB3D76E71C3E220CB103AB4EA81EFF1F3E139
[71d2 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [abfeb45389bf1ce24074eab1505742858ad657818bcb3f5641cc98a11e582b2c]
[71d3 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57606
[71d4 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57606 grpc.code=OK grpc.call_duration=18.5697ms
[71d5 01-03 17:57:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[71d6 01-03 17:57:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[71d7 01-03 17:57:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[71d8 01-03 17:57:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[71d9 01-03 17:57:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71da 01-03 17:57:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71db 01-03 17:57:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71dc 01-03 17:57:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[71dd 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074222648298800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[71de 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074222648298800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[71df 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71e0 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[71e1 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[71e2 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[71e3 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[71e4 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[71e5 01-03 17:57:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[71e6 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[71e7 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[71e8 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[71e9 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045177e0 gate 1578074226381474100 evaluation starts
[71ea 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045177e0 signed by 0 principal evaluation starts (used [false])
[71eb 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045177e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[71ec 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045177e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[71ed 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045177e0 principal evaluation fails
[71ee 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045177e0 gate 1578074226381474100 evaluation fails
[71ef 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[71f0 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[71f1 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[71f2 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[71f3 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[71f4 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[71f5 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045380e0 gate 1578074226384998700 evaluation starts
[71f6 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045380e0 signed by 0 principal evaluation starts (used [false])
[71f7 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045380e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[71f8 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045380e0 principal evaluation succeeds for identity 0
[71f9 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045380e0 gate 1578074226384998700 evaluation succeeds
[71fa 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[71fb 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[71fc 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[71fd 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[71fe 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71ff 01-03 17:57:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7200 01-03 17:57:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[7201 01-03 17:57:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[7202 01-03 17:57:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315101D1801
[7203 01-03 17:57:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FFF8B4F043E9B7BCFAA4C1431921BCF5E7C70C4B63C3E2C5A5C205C67FF6B435
[7204 01-03 17:57:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[7205 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7206 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7207 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7208 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7209 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:29 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[720a 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[720b 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[720c 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:29 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[720d 01-03 17:57:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[720e 01-03 17:57:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[720f 01-03 17:57:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7210 01-03 17:57:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7211 01-03 17:57:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7212 01-03 17:57:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 27 28 14 fa 8e 2a e3 37 9a 6b 83 13 1f 83 80 |I'(...*.7.k.....|
00000010 fd 98 dc d3 2c a0 6d 19 82 ad bf 14 60 a7 dd fc |....,.m.....`...|
[7213 01-03 17:57:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca f6 5e df 54 81 5e 6d 4b 67 06 |0E.!...^.T.^mKg.|
00000010 fb 02 89 06 42 a4 e9 eb 5b ca 00 43 5a 6e 86 0c |....B...[..CZn..|
00000020 78 5a 27 5b 59 02 20 48 db 1f 02 cb 5a c8 43 2c |xZ'[Y. H....Z.C,|
00000030 15 ba 46 fc a5 49 9d 3d 1f 5f 6a 5f 8a 95 a0 d6 |..F..I.=._j_....|
00000040 8c bb e5 14 87 82 ff |.......|
[7214 01-03 17:57:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7215 01-03 17:57:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 ff 59 c0 cb aa ca 58 8e df a0 |0E.!...Y....X...|
00000010 bc 14 89 4a 99 ae 30 7d c6 ce dd 83 c4 45 49 31 |...J..0}.....EI1|
00000020 6a ad 48 bb 15 02 20 0b 1f 54 d0 31 e9 49 58 64 |j.H... ..T.1.IXd|
00000030 96 7e bc 07 99 bc 63 9a 34 99 ce 4a e2 6c c6 34 |.~....c.4..J.l.4|
00000040 b4 76 6d f1 11 30 ab |.vm..0.|
[7216 01-03 17:57:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7217 01-03 17:57:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[7218 01-03 17:57:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82
[7219 01-03 17:57:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82
[721a 01-03 17:57:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[721b 01-03 17:57:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[721c 01-03 17:57:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[721d 01-03 17:57:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[721e 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[721f 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7220 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7221 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7222 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7223 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7224 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[7225 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7226 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[7227 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7228 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[7229 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[722a 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[722b 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[722c 01-03 17:57:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[722d 01-03 17:57:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[722e 01-03 17:57:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[722f 01-03 17:57:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7230 01-03 17:57:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[7231 01-03 17:57:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7232 01-03 17:57:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:18251334264815060517 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7233 01-03 17:57:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:18251334264815060517 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7234 01-03 17:57:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7235 01-03 17:57:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7236 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[7237 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7238 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[7239 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[723a 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 7c b2 91 7d 77 f4 ee 1c fb 47 44 96 20 33 88 |.|..}w....GD. 3.|
00000010 aa 10 0e 54 1f 1d 80 6e 1e 84 7c d4 e7 90 a2 f8 |...T...n..|.....|
[723b 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 e5 bd f4 2b bf 2e 94 1f 2b 92 9e |0D. ....+....+..|
00000010 20 15 c2 73 73 4b fa cb 05 93 50 21 61 a0 3e 35 | ..ssK....P!a.>5|
00000020 ce 47 6d be 02 20 30 71 25 21 eb 29 d3 29 13 6e |.Gm.. 0q%!.).).n|
00000030 60 ed 87 68 a4 a1 07 1d 01 2b 13 02 be 25 e3 fc |`..h.....+...%..|
00000040 c5 d1 42 aa a5 77 |..B..w|
[723c 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[723d 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 de 36 42 4a e1 a1 50 9b ea d2 |0E.!...6BJ..P...|
00000010 87 99 ac 6b 29 4e 45 e1 1d 61 19 99 b8 88 9e 16 |...k)NE..a......|
00000020 cd c6 02 60 d7 02 20 52 6b d9 c0 34 5b 04 11 71 |...`.. Rk..4[..q|
00000030 a6 63 30 1e 3d d0 43 fa 4c 9c bd 44 39 b0 ad cd |.c0.=.C.L..D9...|
00000040 73 fa 0d 7c 02 74 ce |s..|.t.|
[723e 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[723f 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[7240 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83
[7241 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83
[7242 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[7243 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7244 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7245 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7246 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7247 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7248 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7249 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[724a 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[724b 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[724c 01-03 17:57:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[724d 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[724e 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[724f 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7250 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[7251 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7252 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7253 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7254 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7255 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7256 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7257 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7258 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7259 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 1f 28 78 08 bb 0f 9b 6d 01 17 36 4e 5d a4 ac |O.(x....m..6N]..|
00000010 ca 6a 35 33 d3 b8 2c 2d 62 1e 0c 75 bf c2 15 bc |.j53..,-b..u....|
[725a 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb c8 18 7e 07 87 ab b1 af c0 e4 |0E.!....~.......|
00000010 a7 29 ca 52 5c a7 04 0c 01 d3 bf ed 54 8d a8 8e |.).R\.......T...|
00000020 bd a8 66 ac 4f 02 20 33 c9 da 49 ff ba eb 5d 90 |..f.O. 3..I...].|
00000030 ba 75 1a eb d5 ec 99 c1 4a 0f 23 78 96 28 6a b4 |.u......J.#x.(j.|
00000040 43 d1 30 61 14 a9 39 |C.0a..9|
[725b 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[725c 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469b230 gate 1578074227967280200 evaluation starts
[725d 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469b230 signed by 0 principal evaluation starts (used [false])
[725e 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469b230 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[725f 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469b230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7260 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469b230 principal evaluation fails
[7261 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469b230 gate 1578074227967280200 evaluation fails
[7262 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7263 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7264 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7265 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 1f 28 78 08 bb 0f 9b 6d 01 17 36 4e 5d a4 ac |O.(x....m..6N]..|
00000010 ca 6a 35 33 d3 b8 2c 2d 62 1e 0c 75 bf c2 15 bc |.j53..,-b..u....|
[7266 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb c8 18 7e 07 87 ab b1 af c0 e4 |0E.!....~.......|
00000010 a7 29 ca 52 5c a7 04 0c 01 d3 bf ed 54 8d a8 8e |.).R\.......T...|
00000020 bd a8 66 ac 4f 02 20 33 c9 da 49 ff ba eb 5d 90 |..f.O. 3..I...].|
00000030 ba 75 1a eb d5 ec 99 c1 4a 0f 23 78 96 28 6a b4 |.u......J.#x.(j.|
00000040 43 d1 30 61 14 a9 39 |C.0a..9|
[7267 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7268 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bb40 gate 1578074227967866900 evaluation starts
[7269 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bb40 signed by 0 principal evaluation starts (used [false])
[726a 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bb40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[726b 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bb40 principal evaluation succeeds for identity 0
[726c 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bb40 gate 1578074227967866900 evaluation succeeds
[726d 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[726e 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[726f 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7270 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7271 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[7272 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes]}
[7273 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80
[7274 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80
[7275 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7276 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7277 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7278 01-03 17:57:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7279 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727a 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727b 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727c 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727d 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727e 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727f 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7280 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7281 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7282 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7283 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[7284 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7285 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[7286 01-03 17:57:07.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7287 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7288 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[7289 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[728a 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[728b 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[728c 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 9f e1 bf ac 24 4d 8b 31 6e c2 6e 5a 9e f3 ac |.....$M.1n.nZ...|
00000010 28 30 38 3b 58 49 58 f0 b2 3b ac c9 84 9c 93 ca |(08;XIX..;......|
[728d 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 ec c3 dd 77 3c ba c3 fb 80 c0 b4 |0D. 4...w<......|
00000010 01 0f f9 1f 18 23 d6 31 4e 1a 1d 0d 4d 8d fb 20 |.....#.1N...M.. |
00000020 6e 12 fb 3a 02 20 30 65 67 2c f8 0f 49 d1 19 3b |n..:. 0eg,..I..;|
00000030 77 ee a6 f4 43 7d d2 b8 42 ee d1 bd 44 b0 a6 1c |w...C}..B...D...|
00000040 7e d8 57 0f fb a2 |~.W...|
[728e 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[728f 01-03 17:57:07.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745dc0 gate 1578074227989965300 evaluation starts
[7290 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745dc0 signed by 0 principal evaluation starts (used [false])
[7291 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745dc0 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[7292 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745dc0 principal evaluation succeeds for identity 0
[7293 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745dc0 gate 1578074227989965300 evaluation succeeds
[7294 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[7295 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[7296 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[7297 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[7298 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [7] channel=businesschannel
[7299 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [7]
[729a 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[729b 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [7] channel=businesschannel
[729c 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]
[729d 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger
[729e 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [7] from buffer
[72a0 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [7]
[72a1 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [7]
[729f 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4053 bytes, seq: 7}, Envelope: 4083 bytes, Signature: 0 bytes to the block puller
[72a4 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003110f40 env 0xc000116140 txn 0
[72a5 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc000116140
[72a3 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Added 7, total items: 7
[72a2 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[72a6 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\361\200\276\360\005\020\240\246\321\302\003\"\017businesschannel*@c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030y\330\237\206\325\312\365\260\241\211\320u\243\347,\310\371\333\351\025\323P\017R"
[72a7 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[72a8 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[72a9 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[72aa 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[72ab 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[72ac 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8b 74 b2 37 9d b1 e5 ae 35 47 57 2d 73 2a 34 |&.t.7....5GW-s*4|
00000010 f3 d4 41 b1 c8 5f e9 1e 76 bf d6 5b 0a de c8 d7 |..A.._..v..[....|
[72ad 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 88 52 cb f1 8e 2f 6e d1 37 a0 35 |0D. !.R.../n.7.5|
00000010 b1 5a a2 bb 2b a5 96 87 2f f8 4b c2 84 a4 64 4b |.Z..+.../.K...dK|
00000020 58 f3 85 12 02 20 40 2a a5 93 ec a5 49 d7 18 68 |X.... @*....I..h|
00000030 2c 86 eb 36 a1 5e a6 69 27 56 0a d3 2b e1 fd f6 |,..6.^.i'V..+...|
00000040 64 9f 91 63 3f 5b |d..c?[|
[72ae 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[72af 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0003bd800, header channel_header:"\010\003\032\014\010\361\200\276\360\005\020\240\246\321\302\003\"\017businesschannel*@c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030y\330\237\206\325\312\365\260\241\211\320u\243\347,\310\371\333\351\025\323P\017R"
[72b0 01-03 17:57:07.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[72b1 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[72b2 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[72b3 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[72b4 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794]
[72b5 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x36, 0x34, 0x61, 0x36, 0x66, 0x62, 0x62, 0x64, 0x37, 0x31, 0x62, 0x32, 0x33, 0x32, 0x65, 0x37, 0x36, 0x63, 0x32, 0x33, 0x32, 0x39, 0x65, 0x35, 0x63, 0x37, 0x35, 0x62, 0x65, 0x61, 0x30, 0x37, 0x32, 0x63, 0x62, 0x66, 0x30, 0x37, 0x63, 0x38, 0x65, 0x33, 0x32, 0x35, 0x66, 0x61, 0x34, 0x61, 0x37, 0x31, 0x61, 0x33, 0x32, 0x62, 0x66, 0x32, 0x31, 0x31, 0x39, 0x37, 0x37, 0x39, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x36, 0x34, 0x61, 0x36, 0x66, 0x62, 0x62, 0x64, 0x37, 0x31, 0x62, 0x32, 0x33, 0x32, 0x65, 0x37, 0x36, 0x63, 0x32, 0x33, 0x32, 0x39, 0x65, 0x35, 0x63, 0x37, 0x35, 0x62, 0x65, 0x61, 0x30, 0x37, 0x32, 0x63, 0x62, 0x66, 0x30, 0x37, 0x63, 0x38, 0x65, 0x33, 0x32, 0x35, 0x66, 0x61, 0x34, 0x61, 0x37, 0x31, 0x61, 0x33, 0x32, 0x62, 0x66, 0x32, 0x31, 0x31, 0x39, 0x37, 0x37, 0x39, 0x34, 0xff}]
[72b6 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[72b7 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc000379c00
[72b8 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a966d52b-5ae3-41de-b0b5-2b1128453c3f]
[72b9 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[72ba 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[72bb 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo
[72bc 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo
[72bd 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections
[72be 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a966d52b-5ae3-41de-b0b5-2b1128453c3f]
[72bf 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin
[72c0 01-03 17:57:08.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1bc36961-ec1d-47e5-91bc-8925309cfce4]
[72c1 01-03 17:57:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1bc36961-ec1d-47e5-91bc-8925309cfce4]
[72c2 01-03 17:57:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 0a 23 7d 41 fc 1f f5 c2 a5 f6 aa dc e4 7c a2 |..#}A.........|.|
00000010 12 d1 44 48 71 12 8f a7 4e a4 93 ac 20 8d f8 03 |..DHq...N... ...|
[72c3 01-03 17:57:08.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 7d d7 04 a3 9e c3 0a 97 15 87 |0E.!..}.........|
00000010 c3 5d 33 6a aa f8 a5 22 7a bd d4 d6 76 92 7e 16 |.]3j..."z...v.~.|
00000020 56 d2 63 f2 16 02 20 6b 02 0d 96 91 7c 85 86 fb |V.c... k....|...|
00000030 29 55 b4 f5 d3 4c a6 da 13 88 a4 5e 8f 23 f6 5c |)U...L.....^.#.\|
00000040 90 8b 3a 17 4d 86 bc |..:.M..|
[72c4 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[72c5 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479d610 gate 1578074228021317800 evaluation starts
[72c6 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479d610 signed by 0 principal evaluation starts (used [false])
[72c7 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479d610 processing identity 0 - &{Org1MSP 72d14a8ffb3355b2cd5ce4f5575706e3d93f82ccf34f87f37b6ede3c9fbcf9a5}
[72c8 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479d610 principal evaluation succeeds for identity 0
[72c9 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479d610 signed by 1 principal evaluation starts (used [true])
[72ca 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479d610 skipping identity 0 because it has already been used
[72cb 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479d610 principal evaluation fails
[72cc 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479d610 gate 1578074228021317800 evaluation succeeds
[72cd 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [adb7988d-23cd-46c6-9f7b-0aa0676b3a54]
[72ce 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [adb7988d-23cd-46c6-9f7b-0aa0676b3a54]
[72cf 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU block 7, namespace: exp02, tx 0 validation results is: <nil>
[72d0 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794 appears to be valid
[72d1 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc000379c00
[72d2 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003110f40 env 0xc000116140 txn 0
[72d3 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[72d4 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [7] in 31ms
[72d5 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[72d6 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[72d7 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[72d8 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [7] channel=businesschannel
[72d9 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [7]
[72da 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[72db 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[72dc 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[72dd 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [7]
[72de 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[72df 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[72e0 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[72e1 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}
[72e2 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[72e3 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}
[72e4 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[72e5 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}
[72e6 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b
[72e7 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}
[72e8 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Block [7] Transaction index [0] TxId [c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794] marked as valid by state validator. ContainsPostOrderWrites [false]
[72e9 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002ec6b00), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002ec6b40)}
[72ea 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[72eb 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[72ec 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[72ed 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [7]
[72ee 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [7] to storage
[72ef 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [7] to pvt block store
[72f0 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [7]
[72f1 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[72f2 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72f3 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[72f4 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72f5 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72f6 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72f7 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72f8 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72f9 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4053 bytes, seq: 7}, Envelope: 4083 bytes, Signature: 0 bytes to 1 peers
[72fa 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72fb 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72fc 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4053 bytes, seq: 7}, Envelope: 4083 bytes, Signature: 0 bytes
[72fd 01-03 17:57:08.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72fe 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [7]
[72ff 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=7, blockHash=[]byte{0x53, 0x81, 0x25, 0xf2, 0x18, 0xed, 0xc5, 0xf1, 0xa, 0xcd, 0x75, 0xcc, 0x1f, 0xce, 0x77, 0xbb, 0x4b, 0x91, 0x2b, 0x36, 0x61, 0x2d, 0x54, 0x8e, 0xef, 0x8d, 0x6f, 0x66, 0x56, 0xc0, 0x6b, 0x29} txOffsets=
txId=c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794 locPointer=offset=70, bytesLength=3044
]
[7300 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[7301 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[7302 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7303 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=90889, bytesLength=3044] for tx ID: [c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794] to txid-index
[7304 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=90889, bytesLength=3044] for tx number:[0] ID: [c64a6fbbd71b232e76c2329e5c75bea072cbf07c8e325fa4a71a32bf21197794] to blockNumTranNum index
[7305 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[7307 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94894], isChainEmpty=[false], lastBlockNumber=[7]
[7308 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [7] transactions to state database
[7309 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[730a 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[730b 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[730c 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[730d 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02b] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]
[730e 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02a] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]
[7306 01-03 17:57:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[730f 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[7310 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [8]
[7312 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]
[7313 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [8]
[7311 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[7314 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [7] transactions to history database
[7315 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions
[7316 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [7]
[7317 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [7] with 1 transaction(s) in 20ms (state_validation=0ms block_and_pvtdata_commit=14ms state_commit=3ms) commitHash=[5f94533580298a51e0fa12b875ca26341b85346a9f7b274030055634ddd188c1]
[7318 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6A121408908FF491D1C09CF315...2A0E08081A0A0A056578703032120131
[7319 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2DB284079760C3CAC4B826FAA8B9659F518C9BDF09A3D70E3E931318E52B42A7
[731a 01-03 17:57:08.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [7] with 1 transaction(s)
[731b 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[731c 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[731d 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[731e 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[731f 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[7320 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7321 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7322 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7323 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7324 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7325 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7326 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7327 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 42 9a e0 34 5f 5b 8b 71 7d 5e f6 f9 31 c8 76 |.B..4_[.q}^..1.v|
00000010 d8 cf b2 22 c7 b9 1f 74 6f ad 4d a9 2b 66 ca 84 |..."...to.M.+f..|
[7328 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b f2 45 16 9f 58 84 6f 28 42 34 5a |0D. ..E..X.o(B4Z|
00000010 ac 30 ff cd c6 68 77 63 47 7a d7 3c e0 5b 1e c2 |.0...hwcGz.<.[..|
00000020 aa da c2 a0 02 20 60 4a a1 ec f7 4d 30 79 26 ca |..... `J...M0y&.|
00000030 3c dd 0b b3 8a fe e7 d7 51 17 df 5c 64 29 cd a5 |<.......Q..\d)..|
00000040 15 4c 7d ab 9f 54 |.L}..T|
[7329 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[732a 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7600 gate 1578074228087269400 evaluation starts
[732b 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7600 signed by 0 principal evaluation starts (used [false])
[732c 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7600 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[732d 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[732e 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7600 principal evaluation fails
[732f 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7600 gate 1578074228087269400 evaluation fails
[7330 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7331 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7332 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7333 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 42 9a e0 34 5f 5b 8b 71 7d 5e f6 f9 31 c8 76 |.B..4_[.q}^..1.v|
00000010 d8 cf b2 22 c7 b9 1f 74 6f ad 4d a9 2b 66 ca 84 |..."...to.M.+f..|
[7334 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b f2 45 16 9f 58 84 6f 28 42 34 5a |0D. ..E..X.o(B4Z|
00000010 ac 30 ff cd c6 68 77 63 47 7a d7 3c e0 5b 1e c2 |.0...hwcGz.<.[..|
00000020 aa da c2 a0 02 20 60 4a a1 ec f7 4d 30 79 26 ca |..... `J...M0y&.|
00000030 3c dd 0b b3 8a fe e7 d7 51 17 df 5c 64 29 cd a5 |<.......Q..\d)..|
00000040 15 4c 7d ab 9f 54 |.L}..T|
[7335 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7336 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318a520 gate 1578074228087925500 evaluation starts
[7337 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318a520 signed by 0 principal evaluation starts (used [false])
[7338 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318a520 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7339 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318a520 principal evaluation succeeds for identity 0
[733a 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318a520 gate 1578074228087925500 evaluation succeeds
[733b 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[733c 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[733d 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[733e 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[733f 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7340 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes]}
[7341 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82
[7342 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82
[7343 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7344 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7345 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7346 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7347 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7348 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7349 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[734a 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[734b 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[734c 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[734d 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[734e 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[734f 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7350 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7351 01-03 17:57:08.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7352 01-03 17:57:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7353 01-03 17:57:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7354 01-03 17:57:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7355 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315104F
[7356 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 41C6A84ACB49FC09E7BF8156BAAB5766DB9A08EC2F66B411063ACC3F81ED25D0
[7357 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7358 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7359 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[735a 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[735b 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[735c 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[735d 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[735e 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[735f 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7360 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[7361 01-03 17:57:08.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7362 01-03 17:57:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7363 01-03 17:57:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7364 01-03 17:57:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7365 01-03 17:57:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[7366 01-03 17:57:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7367 01-03 17:57:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57610
[7368 01-03 17:57:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[7369 01-03 17:57:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1 creator is valid
[736a 01-03 17:57:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 6f 56 36 9a 00 8f 99 40 28 00 3a cc 39 25 34 |,oV6....@(.:.9%4|
00000010 38 2c a4 c0 6b a7 be 1d 85 10 b3 14 86 eb 7b fc |8,..k.........{.|
[736b 01-03 17:57:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 53 98 31 d7 9f 33 cd 0f aa 0a 84 |0D. wS.1..3.....|
00000010 47 3a b0 2f 4e e0 4d 3c a1 63 3c 48 ae f8 5a 84 |G:./N.M<.c<H..Z.|
00000020 6e 54 a4 6f 02 20 6a 63 a7 9d 3e 29 13 90 d7 40 |nT.o. jc..>)...@|
00000030 06 32 8c 54 f6 46 96 2f e3 a9 c2 16 42 1a be 72 |.2.T.F./....B..r|
00000040 83 08 8a 9a a6 01 |......|
[736c 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1 signature is valid
[736d 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8fd928cb] processing txid: 8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1
[736e 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1]
[736f 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x38, 0x66, 0x64, 0x39, 0x32, 0x38, 0x63, 0x62, 0x39, 0x64, 0x33, 0x36, 0x30, 0x36, 0x61, 0x63, 0x64, 0x31, 0x31, 0x61, 0x33, 0x63, 0x37, 0x61, 0x64, 0x33, 0x35, 0x62, 0x37, 0x64, 0x37, 0x37, 0x63, 0x66, 0x66, 0x33, 0x38, 0x62, 0x66, 0x39, 0x64, 0x64, 0x64, 0x34, 0x61, 0x30, 0x61, 0x64, 0x37, 0x31, 0x34, 0x61, 0x61, 0x35, 0x37, 0x61, 0x64, 0x35, 0x64, 0x33, 0x38, 0x32, 0x64, 0x31}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x38, 0x66, 0x64, 0x39, 0x32, 0x38, 0x63, 0x62, 0x39, 0x64, 0x33, 0x36, 0x30, 0x36, 0x61, 0x63, 0x64, 0x31, 0x31, 0x61, 0x33, 0x63, 0x37, 0x61, 0x64, 0x33, 0x35, 0x62, 0x37, 0x64, 0x37, 0x37, 0x63, 0x66, 0x66, 0x33, 0x38, 0x62, 0x66, 0x39, 0x64, 0x64, 0x64, 0x34, 0x61, 0x30, 0x61, 0x64, 0x37, 0x31, 0x34, 0x61, 0x61, 0x35, 0x37, 0x61, 0x64, 0x35, 0x64, 0x33, 0x38, 0x32, 0x64, 0x31, 0xff}]
[7370 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[7371 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[7372 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[7373 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7374 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[7375 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 6f 56 36 9a 00 8f 99 40 28 00 3a cc 39 25 34 |,oV6....@(.:.9%4|
00000010 38 2c a4 c0 6b a7 be 1d 85 10 b3 14 86 eb 7b fc |8,..k.........{.|
[7376 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 53 98 31 d7 9f 33 cd 0f aa 0a 84 |0D. wS.1..3.....|
00000010 47 3a b0 2f 4e e0 4d 3c a1 63 3c 48 ae f8 5a 84 |G:./N.M<.c<H..Z.|
00000020 6e 54 a4 6f 02 20 6a 63 a7 9d 3e 29 13 90 d7 40 |nT.o. jc..>)...@|
00000030 06 32 8c 54 f6 46 96 2f e3 a9 c2 16 42 1a be 72 |.2.T.F./....B..r|
00000040 83 08 8a 9a a6 01 |......|
[7377 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7378 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b95b0 gate 1578074228421230300 evaluation starts
[7379 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b95b0 signed by 0 principal evaluation starts (used [false])
[737a 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b95b0 processing identity 0 - &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[737b 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b95b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[737c 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b95b0 principal evaluation fails
[737d 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b95b0 gate 1578074228421230300 evaluation fails
[737e 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers
[737f 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[7380 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==
[7381 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 6f 56 36 9a 00 8f 99 40 28 00 3a cc 39 25 34 |,oV6....@(.:.9%4|
00000010 38 2c a4 c0 6b a7 be 1d 85 10 b3 14 86 eb 7b fc |8,..k.........{.|
[7382 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 53 98 31 d7 9f 33 cd 0f aa 0a 84 |0D. wS.1..3.....|
00000010 47 3a b0 2f 4e e0 4d 3c a1 63 3c 48 ae f8 5a 84 |G:./N.M<.c<H..Z.|
00000020 6e 54 a4 6f 02 20 6a 63 a7 9d 3e 29 13 90 d7 40 |nT.o. jc..>)...@|
00000030 06 32 8c 54 f6 46 96 2f e3 a9 c2 16 42 1a be 72 |.2.T.F./....B..r|
00000040 83 08 8a 9a a6 01 |......|
[7383 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7384 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9eb0 gate 1578074228423383100 evaluation starts
[7385 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9eb0 signed by 0 principal evaluation starts (used [false])
[7386 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9eb0 processing identity 0 - &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[7387 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9eb0 principal evaluation succeeds for identity 0
[7388 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9eb0 gate 1578074228423383100 evaluation succeeds
[7389 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers
[738a 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers
[738b 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[738c 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[738d 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[738e 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1]
[738f 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7390 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8fd928cb] Entry chaincode: exp02
[7391 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8fd928cb] Entry chaincode: exp02
[7392 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd928cb] getting chaincode data for exp02 on channel businesschannel
[7393 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7394 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[7395 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7396 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd928cb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[7397 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd928cb] handling GET_STATE from chaincode
[7398 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd928cb] getting state for chaincode exp02, key a, channel businesschannel
[7399 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[739a 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd928cb] Completed GET_STATE. Sending RESPONSE
[739b 01-03 17:57:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd928cb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[739c 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd928cb] notifying Txid:8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1, channelID:businesschannel
[739d 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[739e 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8fd928cb] Exit chaincode: exp02 (5ms)
[739f 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[73a0 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1]
[73a1 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8fd928cb] Exit
[73a2 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8fd928cb] escc for chaincode exp02 is escc
[73a3 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20931D35A740985336F85E23BE4C64...455254494649434154452D2D2D2D2D0A
[73a4 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC8B02E2CD6AA613A0EBCE79A9D95952B21E2C1E2AE8887A19886E4DD2539A83
[73a5 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8fd928cb9d3606acd11a3c7ad35b7d77cff38bf9ddd4a0ad714aa57ad5d382d1]
[73a6 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57610
[73a7 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57610 grpc.code=OK grpc.call_duration=12.8611ms
[73a8 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:57610: read: connection reset by peer
[73a9 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[73aa 01-03 17:57:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[73ab 01-03 17:57:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57614
[73ac 01-03 17:57:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[73ad 01-03 17:57:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c creator is valid
[73ae 01-03 17:57:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 9d d4 38 dc f3 01 b8 b0 26 27 d2 12 c9 4a fd |...8.....&'...J.|
00000010 3b 8b 59 bb 29 22 84 1a 9b 5b 05 8b 95 13 3b 92 |;.Y.)"...[....;.|
[73af 01-03 17:57:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 f2 76 83 ac cd 5e aa 3f 4d 7b f3 |0D. ..v...^.?M{.|
00000010 78 ff 21 fc 6c 39 58 d8 c5 3d 51 ac 0e bb d2 21 |x.!.l9X..=Q....!|
00000020 88 12 4f 77 02 20 13 69 ec 2d 14 b5 4f 5c 21 41 |..Ow. .i.-..O\!A|
00000030 01 af 8d 8e 56 86 04 a6 8f 79 62 1e 71 05 ef 14 |....V....yb.q...|
00000040 e4 b3 6c 74 1a 25 |..lt.%|
[73b0 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c signature is valid
[73b1 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ebdaf6b7] processing txid: ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c
[73b2 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c]
[73b3 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x62, 0x64, 0x61, 0x66, 0x36, 0x62, 0x37, 0x65, 0x34, 0x61, 0x66, 0x37, 0x37, 0x63, 0x34, 0x31, 0x62, 0x62, 0x35, 0x33, 0x39, 0x63, 0x37, 0x36, 0x37, 0x33, 0x35, 0x65, 0x30, 0x64, 0x64, 0x38, 0x32, 0x61, 0x61, 0x65, 0x35, 0x65, 0x30, 0x39, 0x61, 0x64, 0x37, 0x37, 0x32, 0x39, 0x66, 0x62, 0x66, 0x38, 0x31, 0x36, 0x61, 0x37, 0x63, 0x64, 0x39, 0x62, 0x64, 0x64, 0x64, 0x39, 0x63}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x62, 0x64, 0x61, 0x66, 0x36, 0x62, 0x37, 0x65, 0x34, 0x61, 0x66, 0x37, 0x37, 0x63, 0x34, 0x31, 0x62, 0x62, 0x35, 0x33, 0x39, 0x63, 0x37, 0x36, 0x37, 0x33, 0x35, 0x65, 0x30, 0x64, 0x64, 0x38, 0x32, 0x61, 0x61, 0x65, 0x35, 0x65, 0x30, 0x39, 0x61, 0x64, 0x37, 0x37, 0x32, 0x39, 0x66, 0x62, 0x66, 0x38, 0x31, 0x36, 0x61, 0x37, 0x63, 0x64, 0x39, 0x62, 0x64, 0x64, 0x64, 0x39, 0x63, 0xff}]
[73b4 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[73b5 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[73b6 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[73b7 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[73b8 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[73b9 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 9d d4 38 dc f3 01 b8 b0 26 27 d2 12 c9 4a fd |...8.....&'...J.|
00000010 3b 8b 59 bb 29 22 84 1a 9b 5b 05 8b 95 13 3b 92 |;.Y.)"...[....;.|
[73ba 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 f2 76 83 ac cd 5e aa 3f 4d 7b f3 |0D. ..v...^.?M{.|
00000010 78 ff 21 fc 6c 39 58 d8 c5 3d 51 ac 0e bb d2 21 |x.!.l9X..=Q....!|
00000020 88 12 4f 77 02 20 13 69 ec 2d 14 b5 4f 5c 21 41 |..Ow. .i.-..O\!A|
00000030 01 af 8d 8e 56 86 04 a6 8f 79 62 1e 71 05 ef 14 |....V....yb.q...|
00000040 e4 b3 6c 74 1a 25 |..lt.%|
[73bb 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[73bc 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242120 gate 1578074228603062400 evaluation starts
[73bd 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242120 signed by 0 principal evaluation starts (used [false])
[73be 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242120 processing identity 0 - &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[73bf 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[73c0 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242120 principal evaluation fails
[73c1 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242120 gate 1578074228603062400 evaluation fails
[73c2 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers
[73c3 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[73c4 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==
[73c5 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 9d d4 38 dc f3 01 b8 b0 26 27 d2 12 c9 4a fd |...8.....&'...J.|
00000010 3b 8b 59 bb 29 22 84 1a 9b 5b 05 8b 95 13 3b 92 |;.Y.)"...[....;.|
[73c6 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 f2 76 83 ac cd 5e aa 3f 4d 7b f3 |0D. ..v...^.?M{.|
00000010 78 ff 21 fc 6c 39 58 d8 c5 3d 51 ac 0e bb d2 21 |x.!.l9X..=Q....!|
00000020 88 12 4f 77 02 20 13 69 ec 2d 14 b5 4f 5c 21 41 |..Ow. .i.-..O\!A|
00000030 01 af 8d 8e 56 86 04 a6 8f 79 62 1e 71 05 ef 14 |....V....yb.q...|
00000040 e4 b3 6c 74 1a 25 |..lt.%|
[73c7 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[73c8 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242a20 gate 1578074228604923900 evaluation starts
[73c9 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242a20 signed by 0 principal evaluation starts (used [false])
[73ca 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242a20 processing identity 0 - &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[73cb 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242a20 principal evaluation succeeds for identity 0
[73cc 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242a20 gate 1578074228604923900 evaluation succeeds
[73cd 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers
[73ce 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers
[73cf 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[73d0 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[73d1 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[73d2 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c]
[73d3 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[73d4 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ebdaf6b7] Entry chaincode: exp02
[73d5 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ebdaf6b7] Entry chaincode: exp02
[73d6 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] getting chaincode data for exp02 on channel businesschannel
[73d7 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[73d8 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[73d9 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[73da 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[73db 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] handling GET_STATE from chaincode
[73dc 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] getting state for chaincode exp02, key a, channel businesschannel
[73dd 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[73de 01-03 17:57:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Completed GET_STATE. Sending RESPONSE
[73df 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[73e0 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] handling GET_STATE from chaincode
[73e1 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] getting state for chaincode exp02, key b, channel businesschannel
[73e2 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b
[73e3 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Completed GET_STATE. Sending RESPONSE
[73e4 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[73e5 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] handling PUT_STATE from chaincode
[73e6 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Completed PUT_STATE. Sending RESPONSE
[73e7 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[73e8 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] handling PUT_STATE from chaincode
[73e9 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Completed PUT_STATE. Sending RESPONSE
[73ea 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[73eb 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [ebdaf6b7] notifying Txid:ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c, channelID:businesschannel
[73ec 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[73ed 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ebdaf6b7] Exit chaincode: exp02 (8ms)
[73ee 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[73ef 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c]
[73f0 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ebdaf6b7] Exit
[73f1 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ebdaf6b7] escc for chaincode exp02 is escc
[73f2 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F4D610736FE03174099830B0804E...455254494649434154452D2D2D2D2D0A
[73f3 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C5408F4A1B93E00A13EF8F5475D47B4F905A51BCAFA972B9D1B5DD35896A3B40
[73f4 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c]
[73f5 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57614
[73f6 01-03 17:57:08.61 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57614 grpc.code=OK grpc.call_duration=19.4538ms
[73f7 01-03 17:57:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[73f8 01-03 17:57:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[73f9 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57620
[73fa 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU 44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[73fb 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU 44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd creator is valid
[73fc 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c c4 10 44 18 2a f7 a1 50 41 de 56 93 71 0d 13 |\..D.*..PA.V.q..|
00000010 8d 4d fd 35 65 56 43 93 f3 ea 63 ad e4 85 ea 23 |.M.5eVC...c....#|
[73fd 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 78 be 60 b8 fa ac b7 f2 77 82 a5 |0D. Nx.`.....w..|
00000010 98 d9 5b 4c 99 52 ca 0f b2 e3 a9 02 10 d8 66 e9 |..[L.R........f.|
00000020 33 ad 49 9e 02 20 13 61 b7 62 25 90 e4 76 5d 7f |3.I.. .a.b%..v].|
00000030 89 16 5f 01 63 7b 74 85 a5 68 20 c8 a7 cd a6 64 |.._.c{t..h ....d|
00000040 f9 0a af f4 d8 42 |.....B|
[73fe 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU 44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd signature is valid
[73ff 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][44d6b21f] processing txid: 44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd
[7400 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd]
[7401 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x34, 0x34, 0x64, 0x36, 0x62, 0x32, 0x31, 0x66, 0x63, 0x37, 0x62, 0x66, 0x37, 0x66, 0x33, 0x33, 0x65, 0x61, 0x38, 0x64, 0x39, 0x63, 0x39, 0x65, 0x65, 0x38, 0x37, 0x39, 0x38, 0x34, 0x32, 0x64, 0x36, 0x30, 0x35, 0x65, 0x64, 0x66, 0x66, 0x31, 0x32, 0x37, 0x62, 0x63, 0x36, 0x33, 0x36, 0x31, 0x66, 0x36, 0x31, 0x38, 0x37, 0x63, 0x35, 0x34, 0x39, 0x32, 0x61, 0x33, 0x32, 0x37, 0x66, 0x64}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x34, 0x34, 0x64, 0x36, 0x62, 0x32, 0x31, 0x66, 0x63, 0x37, 0x62, 0x66, 0x37, 0x66, 0x33, 0x33, 0x65, 0x61, 0x38, 0x64, 0x39, 0x63, 0x39, 0x65, 0x65, 0x38, 0x37, 0x39, 0x38, 0x34, 0x32, 0x64, 0x36, 0x30, 0x35, 0x65, 0x64, 0x66, 0x66, 0x31, 0x32, 0x37, 0x62, 0x63, 0x36, 0x33, 0x36, 0x31, 0x66, 0x36, 0x31, 0x38, 0x37, 0x63, 0x35, 0x34, 0x39, 0x32, 0x61, 0x33, 0x32, 0x37, 0x66, 0x64, 0xff}]
[7402 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[7403 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[7404 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[7405 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7406 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[7407 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c c4 10 44 18 2a f7 a1 50 41 de 56 93 71 0d 13 |\..D.*..PA.V.q..|
00000010 8d 4d fd 35 65 56 43 93 f3 ea 63 ad e4 85 ea 23 |.M.5eVC...c....#|
[7408 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 78 be 60 b8 fa ac b7 f2 77 82 a5 |0D. Nx.`.....w..|
00000010 98 d9 5b 4c 99 52 ca 0f b2 e3 a9 02 10 d8 66 e9 |..[L.R........f.|
00000020 33 ad 49 9e 02 20 13 61 b7 62 25 90 e4 76 5d 7f |3.I.. .a.b%..v].|
00000030 89 16 5f 01 63 7b 74 85 a5 68 20 c8 a7 cd a6 64 |.._.c{t..h ....d|
00000040 f9 0a af f4 d8 42 |.....B|
[7409 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[740a 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a610 gate 1578074228816514900 evaluation starts
[740b 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a610 signed by 0 principal evaluation starts (used [false])
[740c 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a610 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[740d 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a610 principal evaluation succeeds for identity 0
[740e 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330a610 gate 1578074228816514900 evaluation succeeds
[740f 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[7410 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[7411 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[7412 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[7413 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[7414 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd]
[7415 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7416 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][44d6b21f] Entry chaincode: exp02
[7417 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][44d6b21f] Entry chaincode: exp02
[7418 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU [44d6b21f] getting chaincode data for exp02 on channel businesschannel
[7419 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[741a 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[741b 01-03 17:57:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[741c 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU [44d6b21f] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[741d 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU [44d6b21f] handling GET_STATE from chaincode
[741e 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU [44d6b21f] getting state for chaincode exp02, key a, channel businesschannel
[741f 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7420 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU [44d6b21f] Completed GET_STATE. Sending RESPONSE
[7421 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU [44d6b21f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7422 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU [44d6b21f] notifying Txid:44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd, channelID:businesschannel
[7423 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7424 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][44d6b21f] Exit chaincode: exp02 (5ms)
[7425 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[7426 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd]
[7427 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][44d6b21f] Exit
[7428 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][44d6b21f] escc for chaincode exp02 is escc
[7429 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C1D2BEA270D4D0193B9459757C57...455254494649434154452D2D2D2D2D0A
[742a 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7D0B9A2FB17981D14EEE3388551F38C42DB56BDE9FF922D461F90700C4E684EB
[742b 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [44d6b21fc7bf7f33ea8d9c9ee879842d605edff127bc6361f6187c5492a327fd]
[742c 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57620
[742d 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57620 grpc.code=OK grpc.call_duration=11.6841ms
[742e 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[742f 01-03 17:57:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7430 01-03 17:57:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:489128874144372657 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7431 01-03 17:57:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:489128874144372657 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7432 01-03 17:57:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:489128874144372657 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7433 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7434 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7435 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7436 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7437 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7438 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7439 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[743a 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[743b 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:4361482232408313129 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[743c 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:4361482232408313129 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[743d 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4361482232408313129 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[743e 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[743f 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7440 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7441 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7442 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7443 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7444 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[7445 01-03 17:57:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7446 01-03 17:57:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7447 01-03 17:57:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7448 01-03 17:57:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7449 01-03 17:57:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[744a 01-03 17:57:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[744b 01-03 17:57:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[744c 01-03 17:57:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[744d 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[744e 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[744f 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7450 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7451 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7452 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e fb f4 9e 3e 41 23 3f ec 58 1c 69 03 d6 ac 2d |N...>A#?.X.i...-|
00000010 79 13 9e 36 28 8c 82 4e 8f 8d 11 e4 bb 1c 95 fa |y..6(..N........|
[7453 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 3a 8c 53 84 51 e6 16 8d 45 54 |0E.!..:.S.Q...ET|
00000010 a9 a8 cb 8b 26 d3 10 da 0e 1e f9 02 18 84 d3 9e |....&...........|
00000020 90 33 01 a2 11 02 20 03 f6 ca e5 97 71 13 29 20 |.3.... .....q.) |
00000030 50 68 78 d7 0b 79 4c 6d 48 4a 70 68 e0 d4 e6 48 |Phx..yLmHJph...H|
00000040 94 1f f1 eb 79 ac 93 |....y..|
[7454 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7455 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348f20 gate 1578074229153162700 evaluation starts
[7456 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348f20 signed by 0 principal evaluation starts (used [false])
[7457 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348f20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7458 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7459 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348f20 principal evaluation fails
[745a 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003348f20 gate 1578074229153162700 evaluation fails
[745b 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[745c 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[745d 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[745e 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e fb f4 9e 3e 41 23 3f ec 58 1c 69 03 d6 ac 2d |N...>A#?.X.i...-|
00000010 79 13 9e 36 28 8c 82 4e 8f 8d 11 e4 bb 1c 95 fa |y..6(..N........|
[745f 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 3a 8c 53 84 51 e6 16 8d 45 54 |0E.!..:.S.Q...ET|
00000010 a9 a8 cb 8b 26 d3 10 da 0e 1e f9 02 18 84 d3 9e |....&...........|
00000020 90 33 01 a2 11 02 20 03 f6 ca e5 97 71 13 29 20 |.3.... .....q.) |
00000030 50 68 78 d7 0b 79 4c 6d 48 4a 70 68 e0 d4 e6 48 |Phx..yLmHJph...H|
00000040 94 1f f1 eb 79 ac 93 |....y..|
[7460 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7461 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003349820 gate 1578074229156533100 evaluation starts
[7462 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003349820 signed by 0 principal evaluation starts (used [false])
[7463 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003349820 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7464 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003349820 principal evaluation succeeds for identity 0
[7465 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003349820 gate 1578074229156533100 evaluation succeeds
[7466 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7467 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7468 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7469 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[746a 01-03 17:57:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[746b 01-03 17:57:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes]}
[746c 01-03 17:57:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83
[746d 01-03 17:57:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83
[746e 01-03 17:57:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[746f 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7470 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7471 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7472 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[7473 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7474 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7475 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7476 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[7477 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7478 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7479 01-03 17:57:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[747a 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[747b 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[747c 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[747d 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[747e 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[747f 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7480 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7481 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7482 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7483 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7484 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7485 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7486 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 5b 60 f8 75 04 30 6a 26 e2 21 c0 5e b4 1c 2d |.[`.u.0j&.!.^..-|
00000010 c8 b2 ba 5a 7b 97 f1 53 ee f0 66 ea bb 10 41 44 |...Z{..S..f...AD|
[7487 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 ac 22 55 a0 b7 8a bb 04 67 a0 |0E.!..."U.....g.|
00000010 d2 57 a0 26 53 84 c9 76 8c a2 36 49 3d 4e 1d 76 |.W.&S..v..6I=N.v|
00000020 81 df 33 d5 ac 02 20 0c e3 b3 f3 29 04 07 a6 05 |..3... ....)....|
00000030 ed 13 cb c7 d1 45 77 b5 27 a0 9d ae 32 f2 b3 7e |.....Ew.'...2..~|
00000040 92 e8 51 ac 5c 00 67 |..Q.\.g|
[7488 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7489 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003337ed0 gate 1578074229219799500 evaluation starts
[748a 01-03 17:57:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003337ed0 signed by 0 principal evaluation starts (used [false])
[748b 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003337ed0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[748c 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003337ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[748d 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003337ed0 principal evaluation fails
[748e 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003337ed0 gate 1578074229219799500 evaluation fails
[748f 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7490 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7491 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7492 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 5b 60 f8 75 04 30 6a 26 e2 21 c0 5e b4 1c 2d |.[`.u.0j&.!.^..-|
00000010 c8 b2 ba 5a 7b 97 f1 53 ee f0 66 ea bb 10 41 44 |...Z{..S..f...AD|
[7493 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 ac 22 55 a0 b7 8a bb 04 67 a0 |0E.!..."U.....g.|
00000010 d2 57 a0 26 53 84 c9 76 8c a2 36 49 3d 4e 1d 76 |.W.&S..v..6I=N.v|
00000020 81 df 33 d5 ac 02 20 0c e3 b3 f3 29 04 07 a6 05 |..3... ....)....|
00000030 ed 13 cb c7 d1 45 77 b5 27 a0 9d ae 32 f2 b3 7e |.....Ew.'...2..~|
00000040 92 e8 51 ac 5c 00 67 |..Q.\.g|
[7494 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7495 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033967d0 gate 1578074229221880700 evaluation starts
[7496 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033967d0 signed by 0 principal evaluation starts (used [false])
[7497 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033967d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7498 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033967d0 principal evaluation succeeds for identity 0
[7499 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033967d0 gate 1578074229221880700 evaluation succeeds
[749a 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[749b 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[749c 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[749d 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[749e 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes
[749f 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes]}
[74a0 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81
[74a1 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81
[74a2 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[74a3 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74a4 01-03 17:57:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74a5 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74a6 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[74a7 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74a8 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74a9 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74aa 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[74ab 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[74ac 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[74ad 01-03 17:57:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74ae 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[74af 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:683001415176769175 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[74b0 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[74b1 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1136787475040501657 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[74b2 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[74b3 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7843784677066315942 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[74b4 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7843784677066315942 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[74b5 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74b6 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:683001415176769175 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[74b7 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1136787475040501657 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[74b9 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74b8 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74ba 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1136787475040501657 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[74bb 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1136787475040501657 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[74bc 01-03 17:57:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74bd 01-03 17:57:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 683001415176769175 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[74be 01-03 17:57:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 683001415176769175 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[74bf 01-03 17:57:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 683001415176769175 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[74c0 01-03 17:57:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74c1 01-03 17:57:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7843784677066315942 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[74c2 01-03 17:57:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7843784677066315942 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[74c3 01-03 17:57:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7843784677066315942 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[74c4 01-03 17:57:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74c5 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74c6 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74c7 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[74c8 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[74c9 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74ca 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[74cb 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74cc 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[74cd 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74ce 01-03 17:57:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 773 bytes, Signature: 0 bytes
[74cf 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74d0 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74d1 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074228045437900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes to 3 peers
[74d2 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74d3 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74d4 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074228045437900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[74d5 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74d6 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074228045437900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[74d7 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74d8 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074228045437900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[74d9 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74da 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 ba dd 06 5c 27 15 ba 47 8b 47 26 94 17 77 d0 |....\'..G.G&..w.|
00000010 b4 b5 36 c8 6a 35 cb e1 e9 fd 3f b7 bf 29 8e a8 |..6.j5....?..)..|
[74dd 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 b6 9b 33 e1 04 60 6a 86 5d 64 77 |0D. h..3..`j.]dw|
00000010 d3 e2 87 15 f5 f0 63 00 4e 72 f0 35 88 23 4e 5b |......c.Nr.5.#N[|
00000020 c4 09 96 40 02 20 65 c4 1c c5 65 d3 70 ac 6f ff |...@. e...e.p.o.|
00000030 07 38 6b 09 1d 61 7b a2 83 41 e6 94 9d 69 11 7d |.8k..a{..A...i.}|
00000040 e8 45 3a b8 fd a2 |.E:...|
[74de 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74df 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74e0 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[74e1 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[74e2 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[74e3 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[74e4 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[74e5 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[74e6 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[74e7 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[74e8 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[74e9 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b7ee0 gate 1578074229393812200 evaluation starts
[74db 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 774 bytes, Signature: 0 bytes
[74dc 01-03 17:57:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 773 bytes, Signature: 0 bytes
[74ea 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b7ee0 signed by 0 principal evaluation starts (used [false])
[74eb 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b7ee0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[74ec 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b7ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[74ed 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b7ee0 principal evaluation fails
[74ee 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b7ee0 gate 1578074229393812200 evaluation fails
[74ef 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[74f0 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[74f1 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[74f2 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[74f3 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[74f4 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[74f5 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033da800 gate 1578074229394290300 evaluation starts
[74f6 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033da800 signed by 0 principal evaluation starts (used [false])
[74f7 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033da800 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[74f8 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033da800 principal evaluation succeeds for identity 0
[74f9 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033da800 gate 1578074229394290300 evaluation succeeds
[74fa 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[74fb 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[74fc 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[74fd 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[74fe 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74ff 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7500 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7501 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7502 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7503 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7504 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7505 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7506 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[7507 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[7508 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7509 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6260 gate 1578074229395058100 evaluation starts
[750a 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6260 signed by 0 principal evaluation starts (used [false])
[750b 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6260 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[750c 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[750d 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6260 principal evaluation fails
[750e 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6260 gate 1578074229395058100 evaluation fails
[750f 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7510 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7511 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7512 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[7513 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[7514 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7515 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6b60 gate 1578074229395444200 evaluation starts
[7516 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6b60 signed by 0 principal evaluation starts (used [false])
[7517 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6b60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7518 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6b60 principal evaluation succeeds for identity 0
[7519 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f6b60 gate 1578074229395444200 evaluation succeeds
[751a 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[751b 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[751c 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[751d 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[751e 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 2a 67 03 8a 7b fb 88 42 16 0a 03 da 7b 14 9e |.*g..{..B....{..|
00000010 09 b9 67 5f 87 ec 70 01 0f e8 1c f8 90 27 e7 ba |..g_..p......'..|
[751f 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 94 44 ef 05 dd 4f cd f6 6d 49 |0E.!...D...O..mI|
00000010 64 a7 9f 9a 34 04 f2 a3 37 fe 8d 4f ba de 54 39 |d...4...7..O..T9|
00000020 47 85 4e 9b aa 02 20 77 55 d4 1c 45 24 87 3e 5c |G.N... wU..E$.>\|
00000030 c7 37 c1 bc 8f 67 b3 81 ed 4d 1f 5c 6c 14 21 43 |.7...g...M.\l.!C|
00000040 13 60 4b 15 34 e0 d2 |.`K.4..|
[7520 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7521 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7522 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7523 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7524 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7525 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 2a 67 03 8a 7b fb 88 42 16 0a 03 da 7b 14 9e |.*g..{..B....{..|
00000010 09 b9 67 5f 87 ec 70 01 0f e8 1c f8 90 27 e7 ba |..g_..p......'..|
[7526 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 94 44 ef 05 dd 4f cd f6 6d 49 |0E.!...D...O..mI|
00000010 64 a7 9f 9a 34 04 f2 a3 37 fe 8d 4f ba de 54 39 |d...4...7..O..T9|
00000020 47 85 4e 9b aa 02 20 77 55 d4 1c 45 24 87 3e 5c |G.N... wU..E$.>\|
00000030 c7 37 c1 bc 8f 67 b3 81 ed 4d 1f 5c 6c 14 21 43 |.7...g...M.\l.!C|
00000040 13 60 4b 15 34 e0 d2 |.`K.4..|
[7527 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7528 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f7ed0 gate 1578074229396207200 evaluation starts
[7529 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f7ed0 signed by 0 principal evaluation starts (used [false])
[752a 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f7ed0 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[752b 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f7ed0 principal evaluation succeeds for identity 0
[752c 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f7ed0 gate 1578074229396207200 evaluation succeeds
[752d 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[752e 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[752f 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7530 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7531 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7532 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 774 bytes, Signature: 0 bytes
[7533 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7534 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 ba dd 06 5c 27 15 ba 47 8b 47 26 94 17 77 d0 |....\'..G.G&..w.|
00000010 b4 b5 36 c8 6a 35 cb e1 e9 fd 3f b7 bf 29 8e a8 |..6.j5....?..)..|
[7535 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 b6 9b 33 e1 04 60 6a 86 5d 64 77 |0D. h..3..`j.]dw|
00000010 d3 e2 87 15 f5 f0 63 00 4e 72 f0 35 88 23 4e 5b |......c.Nr.5.#N[|
00000020 c4 09 96 40 02 20 65 c4 1c c5 65 d3 70 ac 6f ff |...@. e...e.p.o.|
00000030 07 38 6b 09 1d 61 7b a2 83 41 e6 94 9d 69 11 7d |.8k..a{..A...i.}|
00000040 e8 45 3a b8 fd a2 |.E:...|
[7536 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 ec 32 8b ff 2b 61 7b fc 47 09 09 d1 13 f1 94 |T.2..+a{.G......|
00000010 1c fd 10 60 27 8e 1b 5a 30 95 48 a2 e6 fd 65 d5 |...`'..Z0.H...e.|
[7537 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db d3 b7 c2 a3 27 6b d3 cc 8f 8a |0E.!......'k....|
00000010 cd e7 d5 48 a6 30 63 e7 de 99 77 f5 44 6d 9c ef |...H.0c...w.Dm..|
00000020 e3 91 93 bc 2a 02 20 54 d5 46 0e e4 57 34 a6 b8 |....*. T.F..W4..|
00000030 56 60 45 65 af bc 9a 40 8f c7 78 0b 4f c5 b0 44 |V`Ee...@..x.O..D|
00000040 ec b5 c9 fe 8b 1d 4b |......K|
[7538 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7539 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[753a 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[753b 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[753c 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[753d 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[753e 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[753f 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7540 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151050
[7541 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC7DF35CA6B8EEB6B2A6BCFB1F79706A5863C3A8F0A8385BA54198ACBC0CA2B6
[7542 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7543 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7544 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7545 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[7546 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7547 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[7548 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[7549 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[754a 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[754b 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[754c 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[754d 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[754e 01-03 17:57:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[754f 01-03 17:57:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[7550 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[7551 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7552 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a940 gate 1578074229413413500 evaluation starts
[7553 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a940 signed by 0 principal evaluation starts (used [false])
[7554 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a940 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7555 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7556 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a940 principal evaluation fails
[7557 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a940 gate 1578074229413413500 evaluation fails
[7558 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7559 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[755a 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[755b 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e3 b6 d4 e5 71 75 41 96 7e 32 21 ba ef b4 e6 |.....quA.~2!....|
00000010 fc fb 86 78 40 a5 bb b3 b1 19 c5 62 90 c4 83 35 |...x@......b...5|
[755c 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 26 f4 2b 00 5d c1 d6 9b e4 99 |0E.!..&.+.].....|
00000010 73 cb f9 e9 ca 67 96 39 6c 3d fe d4 b1 9b 34 81 |s....g.9l=....4.|
00000020 4e 92 ed 0b 49 02 20 0a 09 a3 5d 7b 6b f4 31 b2 |N...I. ...]{k.1.|
00000030 ae c9 fa a0 1f 6c 50 d3 9a f7 44 ab 35 f6 8d 1b |.....lP...D.5...|
00000040 42 88 b6 31 54 65 6f |B..1Teo|
[755d 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[755e 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342b240 gate 1578074229419108600 evaluation starts
[755f 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342b240 signed by 0 principal evaluation starts (used [false])
[7560 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342b240 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7561 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342b240 principal evaluation succeeds for identity 0
[7562 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342b240 gate 1578074229419108600 evaluation succeeds
[7563 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7564 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7565 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7566 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7567 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7568 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7569 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[756a 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[756b 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[756c 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[756d 01-03 17:57:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[756e 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[756f 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[7570 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[7571 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7572 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458ca0 gate 1578074229420576700 evaluation starts
[7573 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458ca0 signed by 0 principal evaluation starts (used [false])
[7574 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458ca0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7575 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7576 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458ca0 principal evaluation fails
[7577 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458ca0 gate 1578074229420576700 evaluation fails
[7578 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7579 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[757a 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[757b 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[757c 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[757d 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[757e 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[757f 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034595a0 gate 1578074229423636600 evaluation starts
[7580 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034595a0 signed by 0 principal evaluation starts (used [false])
[7581 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034595a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7582 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034595a0 principal evaluation succeeds for identity 0
[7583 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034595a0 gate 1578074229423636600 evaluation succeeds
[7584 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7585 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7586 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7587 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7588 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[758a 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[758b 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7589 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074228045437900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[758c 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[758d 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[758e 01-03 17:57:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[758f 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[7590 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[7591 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7592 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e330 gate 1578074229433458400 evaluation starts
[7593 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e330 signed by 0 principal evaluation starts (used [false])
[7594 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e330 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7595 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7596 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e330 principal evaluation fails
[7597 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e330 gate 1578074229433458400 evaluation fails
[7598 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7599 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[759a 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[759b 01-03 17:57:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[759c 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[759d 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[759e 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ec30 gate 1578074229443546700 evaluation starts
[759f 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ec30 signed by 0 principal evaluation starts (used [false])
[75a0 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ec30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[75a1 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ec30 principal evaluation succeeds for identity 0
[75a2 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ec30 gate 1578074229443546700 evaluation succeeds
[75a3 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[75a4 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[75a5 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[75a6 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[75a7 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[75a8 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 773 bytes, Signature: 0 bytes
[75a9 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75aa 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 ba dd 06 5c 27 15 ba 47 8b 47 26 94 17 77 d0 |....\'..G.G&..w.|
00000010 b4 b5 36 c8 6a 35 cb e1 e9 fd 3f b7 bf 29 8e a8 |..6.j5....?..)..|
[75ab 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 b6 9b 33 e1 04 60 6a 86 5d 64 77 |0D. h..3..`j.]dw|
00000010 d3 e2 87 15 f5 f0 63 00 4e 72 f0 35 88 23 4e 5b |......c.Nr.5.#N[|
00000020 c4 09 96 40 02 20 65 c4 1c c5 65 d3 70 ac 6f ff |...@. e...e.p.o.|
00000030 07 38 6b 09 1d 61 7b a2 83 41 e6 94 9d 69 11 7d |.8k..a{..A...i.}|
00000040 e8 45 3a b8 fd a2 |.E:...|
[75ac 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 ec 32 8b ff 2b 61 7b fc 47 09 09 d1 13 f1 94 |T.2..+a{.G......|
00000010 1c fd 10 60 27 8e 1b 5a 30 95 48 a2 e6 fd 65 d5 |...`'..Z0.H...e.|
[75ad 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db d3 b7 c2 a3 27 6b d3 cc 8f 8a |0E.!......'k....|
00000010 cd e7 d5 48 a6 30 63 e7 de 99 77 f5 44 6d 9c ef |...H.0c...w.Dm..|
00000020 e3 91 93 bc 2a 02 20 54 d5 46 0e e4 57 34 a6 b8 |....*. T.F..W4..|
00000030 56 60 45 65 af bc 9a 40 8f c7 78 0b 4f c5 b0 44 |V`Ee...@..x.O..D|
00000040 ec b5 c9 fe 8b 1d 4b |......K|
[75ae 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75af 01-03 17:57:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75b0 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[75b1 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[75b2 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[75b3 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[75b4 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[75b5 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[75b6 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[75b7 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[75b8 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[75b9 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034816a0 gate 1578074229453006000 evaluation starts
[75ba 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034816a0 signed by 0 principal evaluation starts (used [false])
[75bb 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034816a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[75bc 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034816a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[75bd 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034816a0 principal evaluation fails
[75be 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034816a0 gate 1578074229453006000 evaluation fails
[75bf 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[75c0 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[75c1 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[75c2 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 30 bd 6a 5d 70 44 74 0c 40 a6 e4 7a 37 7c 59 |G0.j]pDt.@..z7|Y|
00000010 a2 3c d9 5c 0e 2b 14 eb 2b fd 5c 4e f9 7e 51 4a |.<.\.+..+.\N.~QJ|
[75c3 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d a2 80 45 74 4f a3 30 4d 8b d6 d5 |0D. }..EtO.0M...|
00000010 27 3d d0 3b ed be 3a d0 1f 5c eb 73 8c b2 13 86 |'=.;..:..\.s....|
00000020 3b 96 a0 00 02 20 77 c6 c1 cc be e0 2f 2f 29 d2 |;.... w.....//).|
00000030 07 3b ba 70 b3 2b 4a 43 a1 11 3d ae d6 19 e5 4c |.;.p.+JC..=....L|
00000040 fe 2c 70 7e a8 c3 |.,p~..|
[75c4 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[75c5 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003481fa0 gate 1578074229457497200 evaluation starts
[75c6 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003481fa0 signed by 0 principal evaluation starts (used [false])
[75c7 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003481fa0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[75c8 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003481fa0 principal evaluation succeeds for identity 0
[75c9 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003481fa0 gate 1578074229457497200 evaluation succeeds
[75ca 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[75cb 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[75cc 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[75cd 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[75ce 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[75cf 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75d0 01-03 17:57:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75d1 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[75d2 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[75d3 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[75d4 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[75d5 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[75d6 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[75d7 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[75d8 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[75d9 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[75da 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a24d0 gate 1578074229461906600 evaluation starts
[75db 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a24d0 signed by 0 principal evaluation starts (used [false])
[75dc 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a24d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[75dd 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a24d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[75de 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a24d0 principal evaluation fails
[75df 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a24d0 gate 1578074229461906600 evaluation fails
[75e0 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[75e1 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[75e2 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[75e3 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[75e4 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[75e5 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[75e6 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a2dd0 gate 1578074229463810200 evaluation starts
[75e7 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a2dd0 signed by 0 principal evaluation starts (used [false])
[75e8 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a2dd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[75e9 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a2dd0 principal evaluation succeeds for identity 0
[75ea 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a2dd0 gate 1578074229463810200 evaluation succeeds
[75eb 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[75ec 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[75ed 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[75ee 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[75ef 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75f0 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[75f1 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[75f2 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[75f3 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[75f4 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[75f5 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[75f6 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[75f7 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[75f8 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3b60 gate 1578074229467375400 evaluation starts
[75f9 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3b60 signed by 0 principal evaluation starts (used [false])
[75fa 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3b60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[75fb 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[75fc 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3b60 principal evaluation fails
[75fd 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a3b60 gate 1578074229467375400 evaluation fails
[75fe 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[75ff 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7600 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7601 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[7602 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[7603 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7604 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b2460 gate 1578074229468900900 evaluation starts
[7605 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b2460 signed by 0 principal evaluation starts (used [false])
[7606 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b2460 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7607 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b2460 principal evaluation succeeds for identity 0
[7608 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b2460 gate 1578074229468900900 evaluation succeeds
[7609 01-03 17:57:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[760a 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[760b 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[760c 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[760d 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[760e 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[760f 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7610 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7611 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[7612 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7613 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 7d f3 5c a6 b8 ee b6 b2 a6 bc fb 1f 79 70 6a |.}.\.........ypj|
00000010 58 63 c3 a8 f0 a8 38 5b a5 41 98 ac bc 0c a2 b6 |Xc....8[.A......|
[7614 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 4e f4 fc 7d e4 99 02 3e 2a 3b |0E.!..N..}...>*;|
00000010 c7 46 1f 84 26 d5 56 21 b0 07 91 35 9e 81 c3 f1 |.F..&.V!...5....|
00000020 a7 f1 fd f6 a5 02 20 14 fa 06 ac 8a df 2a 37 e1 |...... ......*7.|
00000030 73 27 6c 42 6d 3e aa df c3 9e 30 29 19 ea 19 2e |s'lBm>....0)....|
00000040 50 13 dd 94 a6 7c cf |P....|.|
[7615 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[7616 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 55 50 46 ba 79 61 00 05 d0 22 |0E.!..UPF.ya..."|
00000010 a7 39 ec 28 cf 5b 96 7e d2 97 27 8e 7f 14 b8 d0 |.9.(.[.~..'.....|
00000020 2b 9d 21 25 4c 02 20 74 53 44 d6 ce 20 34 77 1c |+.!%L. tSD.. 4w.|
00000030 78 48 ba 01 f8 02 bb 4b 1a 1b 1f c1 4e 2d 24 01 |xH.....K....N-$.|
00000040 91 a9 fa c2 25 61 14 |....%a.|
[7617 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7618 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7619 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[761a 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[761b 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[761c 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[761d 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[761e 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[761f 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074228045437900 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[7620 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7621 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7622 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7624 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7625 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7626 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7627 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e fb f4 9e 3e 41 23 3f ec 58 1c 69 03 d6 ac 2d |N...>A#?.X.i...-|
00000010 79 13 9e 36 28 8c 82 4e 8f 8d 11 e4 bb 1c 95 fa |y..6(..N........|
[7628 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 3a 8c 53 84 51 e6 16 8d 45 54 |0E.!..:.S.Q...ET|
00000010 a9 a8 cb 8b 26 d3 10 da 0e 1e f9 02 18 84 d3 9e |....&...........|
00000020 90 33 01 a2 11 02 20 03 f6 ca e5 97 71 13 29 20 |.3.... .....q.) |
00000030 50 68 78 d7 0b 79 4c 6d 48 4a 70 68 e0 d4 e6 48 |Phx..yLmHJph...H|
00000040 94 1f f1 eb 79 ac 93 |....y..|
[7623 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b2 84 07 97 60 c3 ca c4 b8 26 fa a8 b9 65 9f |-....`....&...e.|
00000010 51 8c 9b df 09 a3 d7 0e 3e 93 13 18 e5 2b 42 a7 |Q.......>....+B.|
[7629 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 8d 40 76 64 ed db 3e c2 1a 4a |0E.!...@vd..>..J|
00000010 11 15 33 0b 41 d4 01 4c 32 bd 94 84 00 33 8e 4e |..3.A..L2....3.N|
00000020 6a f4 09 0d 7b 02 20 77 a5 22 6c 41 fe ed da cf |j...{. w."lA....|
00000030 c9 77 59 67 9b 67 9f 9c f3 9a 02 16 1c 6b 85 f8 |.wYg.g.......k..|
00000040 60 8c 90 f1 40 cf ed |`...@..|
[762a 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[762b 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c55e0 gate 1578074229477432600 evaluation starts
[762c 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c55e0 signed by 0 principal evaluation starts (used [false])
[762d 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[762f 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7630 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[762e 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c55e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7631 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c55e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7632 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c55e0 principal evaluation fails
[7633 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c55e0 gate 1578074229477432600 evaluation fails
[7634 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7635 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7636 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7637 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e fb f4 9e 3e 41 23 3f ec 58 1c 69 03 d6 ac 2d |N...>A#?.X.i...-|
00000010 79 13 9e 36 28 8c 82 4e 8f 8d 11 e4 bb 1c 95 fa |y..6(..N........|
[7638 01-03 17:57:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 3a 8c 53 84 51 e6 16 8d 45 54 |0E.!..:.S.Q...ET|
00000010 a9 a8 cb 8b 26 d3 10 da 0e 1e f9 02 18 84 d3 9e |....&...........|
00000020 90 33 01 a2 11 02 20 03 f6 ca e5 97 71 13 29 20 |.3.... .....q.) |
00000030 50 68 78 d7 0b 79 4c 6d 48 4a 70 68 e0 d4 e6 48 |Phx..yLmHJph...H|
00000040 94 1f f1 eb 79 ac 93 |....y..|
[7639 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[763a 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034957a0 gate 1578074229480100500 evaluation starts
[763b 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034957a0 signed by 0 principal evaluation starts (used [false])
[763c 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034957a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[763d 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034957a0 principal evaluation succeeds for identity 0
[763e 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034957a0 gate 1578074229480100500 evaluation succeeds
[763f 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7640 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7641 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7642 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7643 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[7644 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7645 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7646 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 7c b2 91 7d 77 f4 ee 1c fb 47 44 96 20 33 88 |.|..}w....GD. 3.|
00000010 aa 10 0e 54 1f 1d 80 6e 1e 84 7c d4 e7 90 a2 f8 |...T...n..|.....|
[7647 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 e5 bd f4 2b bf 2e 94 1f 2b 92 9e |0D. ....+....+..|
00000010 20 15 c2 73 73 4b fa cb 05 93 50 21 61 a0 3e 35 | ..ssK....P!a.>5|
00000020 ce 47 6d be 02 20 30 71 25 21 eb 29 d3 29 13 6e |.Gm.. 0q%!.).).n|
00000030 60 ed 87 68 a4 a1 07 1d 01 2b 13 02 be 25 e3 fc |`..h.....+...%..|
00000040 c5 d1 42 aa a5 77 |..B..w|
[7648 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7649 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[764a 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[764b 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 7d f3 5c a6 b8 ee b6 b2 a6 bc fb 1f 79 70 6a |.}.\.........ypj|
00000010 58 63 c3 a8 f0 a8 38 5b a5 41 98 ac bc 0c a2 b6 |Xc....8[.A......|
[764c 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 4e f4 fc 7d e4 99 02 3e 2a 3b |0E.!..N..}...>*;|
00000010 c7 46 1f 84 26 d5 56 21 b0 07 91 35 9e 81 c3 f1 |.F..&.V!...5....|
00000020 a7 f1 fd f6 a5 02 20 14 fa 06 ac 8a df 2a 37 e1 |...... ......*7.|
00000030 73 27 6c 42 6d 3e aa df c3 9e 30 29 19 ea 19 2e |s'lBm>....0)....|
00000040 50 13 dd 94 a6 7c cf |P....|.|
[764d 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[764e 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[764f 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7650 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7651 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7653 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7654 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7652 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7655 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7656 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7657 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7658 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7659 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[765a 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[765b 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 5b 60 f8 75 04 30 6a 26 e2 21 c0 5e b4 1c 2d |.[`.u.0j&.!.^..-|
00000010 c8 b2 ba 5a 7b 97 f1 53 ee f0 66 ea bb 10 41 44 |...Z{..S..f...AD|
[765c 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 ac 22 55 a0 b7 8a bb 04 67 a0 |0E.!..."U.....g.|
00000010 d2 57 a0 26 53 84 c9 76 8c a2 36 49 3d 4e 1d 76 |.W.&S..v..6I=N.v|
00000020 81 df 33 d5 ac 02 20 0c e3 b3 f3 29 04 07 a6 05 |..3... ....)....|
00000030 ed 13 cb c7 d1 45 77 b5 27 a0 9d ae 32 f2 b3 7e |.....Ew.'...2..~|
00000040 92 e8 51 ac 5c 00 67 |..Q.\.g|
[765d 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[765e 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fea00 gate 1578074229488610600 evaluation starts
[765f 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fea00 signed by 0 principal evaluation starts (used [false])
[7660 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fea00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7661 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fea00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7662 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fea00 principal evaluation fails
[7663 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fea00 gate 1578074229488610600 evaluation fails
[7664 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7665 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7666 01-03 17:57:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7667 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 5b 60 f8 75 04 30 6a 26 e2 21 c0 5e b4 1c 2d |.[`.u.0j&.!.^..-|
00000010 c8 b2 ba 5a 7b 97 f1 53 ee f0 66 ea bb 10 41 44 |...Z{..S..f...AD|
[7668 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 ac 22 55 a0 b7 8a bb 04 67 a0 |0E.!..."U.....g.|
00000010 d2 57 a0 26 53 84 c9 76 8c a2 36 49 3d 4e 1d 76 |.W.&S..v..6I=N.v|
00000020 81 df 33 d5 ac 02 20 0c e3 b3 f3 29 04 07 a6 05 |..3... ....)....|
00000030 ed 13 cb c7 d1 45 77 b5 27 a0 9d ae 32 f2 b3 7e |.....Ew.'...2..~|
00000040 92 e8 51 ac 5c 00 67 |..Q.\.g|
[7669 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[766a 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ff300 gate 1578074229490874500 evaluation starts
[766b 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ff300 signed by 0 principal evaluation starts (used [false])
[766c 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ff300 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[766d 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ff300 principal evaluation succeeds for identity 0
[766e 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ff300 gate 1578074229490874500 evaluation succeeds
[766f 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7670 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7671 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7672 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7673 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes
[7674 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7675 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7676 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 7d f3 5c a6 b8 ee b6 b2 a6 bc fb 1f 79 70 6a |.}.\.........ypj|
00000010 58 63 c3 a8 f0 a8 38 5b a5 41 98 ac bc 0c a2 b6 |Xc....8[.A......|
[7677 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 4e f4 fc 7d e4 99 02 3e 2a 3b |0E.!..N..}...>*;|
00000010 c7 46 1f 84 26 d5 56 21 b0 07 91 35 9e 81 c3 f1 |.F..&.V!...5....|
00000020 a7 f1 fd f6 a5 02 20 14 fa 06 ac 8a df 2a 37 e1 |...... ......*7.|
00000030 73 27 6c 42 6d 3e aa df c3 9e 30 29 19 ea 19 2e |s'lBm>....0)....|
00000040 50 13 dd 94 a6 7c cf |P....|.|
[7678 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[7679 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[767a 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[767b 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[767c 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 7c b2 91 7d 77 f4 ee 1c fb 47 44 96 20 33 88 |.|..}w....GD. 3.|
00000010 aa 10 0e 54 1f 1d 80 6e 1e 84 7c d4 e7 90 a2 f8 |...T...n..|.....|
[767d 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 e5 bd f4 2b bf 2e 94 1f 2b 92 9e |0D. ....+....+..|
00000010 20 15 c2 73 73 4b fa cb 05 93 50 21 61 a0 3e 35 | ..ssK....P!a.>5|
00000020 ce 47 6d be 02 20 30 71 25 21 eb 29 d3 29 13 6e |.Gm.. 0q%!.).).n|
00000030 60 ed 87 68 a4 a1 07 1d 01 2b 13 02 be 25 e3 fc |`..h.....+...%..|
00000040 c5 d1 42 aa a5 77 |..B..w|
[767e 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[767f 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7680 01-03 17:57:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7681 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7682 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7683 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[7684 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7685 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7686 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1977158989777568100 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[7687 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1977158989777568100 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[7688 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7689 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1977158989777568100 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6 7], Envelope: 54 bytes, Signature: 0 bytes
[768a 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1977158989777568100 , Msg_type: BLOCK_MSG, digests: [2 1 3 4 5 6 7], Envelope: 54 bytes, Signature: 0 bytes
[768b 01-03 17:57:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[768c 01-03 17:57:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[768d 01-03 17:57:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[768e 01-03 17:57:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[768f 01-03 17:57:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7690 01-03 17:57:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074228121554100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[7691 01-03 17:57:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 2a 67 03 8a 7b fb 88 42 16 0a 03 da 7b 14 9e |.*g..{..B....{..|
00000010 09 b9 67 5f 87 ec 70 01 0f e8 1c f8 90 27 e7 ba |..g_..p......'..|
[7692 01-03 17:57:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 94 44 ef 05 dd 4f cd f6 6d 49 |0E.!...D...O..mI|
00000010 64 a7 9f 9a 34 04 f2 a3 37 fe 8d 4f ba de 54 39 |d...4...7..O..T9|
00000020 47 85 4e 9b aa 02 20 77 55 d4 1c 45 24 87 3e 5c |G.N... wU..E$.>\|
00000030 c7 37 c1 bc 8f 67 b3 81 ed 4d 1f 5c 6c 14 21 43 |.7...g...M.\l.!C|
00000040 13 60 4b 15 34 e0 d2 |.`K.4..|
[7693 01-03 17:57:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7694 01-03 17:57:09.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074228121554100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[7695 01-03 17:57:09.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074228121554100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[7696 01-03 17:57:09.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 2a 67 03 8a 7b fb 88 42 16 0a 03 da 7b 14 9e |.*g..{..B....{..|
00000010 09 b9 67 5f 87 ec 70 01 0f e8 1c f8 90 27 e7 ba |..g_..p......'..|
[7697 01-03 17:57:09.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 94 44 ef 05 dd 4f cd f6 6d 49 |0E.!...D...O..mI|
00000010 64 a7 9f 9a 34 04 f2 a3 37 fe 8d 4f ba de 54 39 |d...4...7..O..T9|
00000020 47 85 4e 9b aa 02 20 77 55 d4 1c 45 24 87 3e 5c |G.N... wU..E$.>\|
00000030 c7 37 c1 bc 8f 67 b3 81 ed 4d 1f 5c 6c 14 21 43 |.7...g...M.\l.!C|
00000040 13 60 4b 15 34 e0 d2 |.`K.4..|
[7698 01-03 17:57:09.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7699 01-03 17:57:09.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[769a 01-03 17:57:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074228121554100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[769b 01-03 17:57:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074228121554100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[769c 01-03 17:57:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 2a 67 03 8a 7b fb 88 42 16 0a 03 da 7b 14 9e |.*g..{..B....{..|
00000010 09 b9 67 5f 87 ec 70 01 0f e8 1c f8 90 27 e7 ba |..g_..p......'..|
[769d 01-03 17:57:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 94 44 ef 05 dd 4f cd f6 6d 49 |0E.!...D...O..mI|
00000010 64 a7 9f 9a 34 04 f2 a3 37 fe 8d 4f ba de 54 39 |d...4...7..O..T9|
00000020 47 85 4e 9b aa 02 20 77 55 d4 1c 45 24 87 3e 5c |G.N... wU..E$.>\|
00000030 c7 37 c1 bc 8f 67 b3 81 ed 4d 1f 5c 6c 14 21 43 |.7...g...M.\l.!C|
00000040 13 60 4b 15 34 e0 d2 |.`K.4..|
[769e 01-03 17:57:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[769f 01-03 17:57:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76a0 01-03 17:57:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4779523116730872284 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[76a1 01-03 17:57:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4779523116730872284 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[76a2 01-03 17:57:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [7 1 2 3 4 5 6] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[76a3 01-03 17:57:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76a4 01-03 17:57:10.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[76a5 01-03 17:57:10.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[76a6 01-03 17:57:10.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76a7 01-03 17:57:10.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76a8 01-03 17:57:10.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76a9 01-03 17:57:10.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76aa 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074228066650000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[76ab 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074228066650000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[76ac 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76ad 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[76ae 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[76af 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[76b0 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[76b1 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[76b2 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[76b3 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[76b4 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[76b5 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[76b6 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003572eb0 gate 1578074230154829600 evaluation starts
[76b7 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003572eb0 signed by 0 principal evaluation starts (used [false])
[76b8 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003572eb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[76b9 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003572eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[76ba 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003572eb0 principal evaluation fails
[76bb 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003572eb0 gate 1578074230154829600 evaluation fails
[76bc 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[76bd 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[76be 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[76bf 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[76c0 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[76c1 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[76c2 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035737b0 gate 1578074230155425700 evaluation starts
[76c3 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035737b0 signed by 0 principal evaluation starts (used [false])
[76c4 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035737b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[76c5 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035737b0 principal evaluation succeeds for identity 0
[76c6 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035737b0 gate 1578074230155425700 evaluation succeeds
[76c7 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[76c8 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[76c9 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[76ca 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[76cb 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76cc 01-03 17:57:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76cd 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074228066650000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[76ce 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074228066650000 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[76cf 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76d0 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[76d1 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[76d2 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[76d3 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[76d4 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[76d5 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[76d6 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[76d7 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[76d8 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[76d9 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d520 gate 1578074230286954000 evaluation starts
[76da 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d520 signed by 0 principal evaluation starts (used [false])
[76db 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d520 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[76dc 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[76dd 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d520 principal evaluation fails
[76de 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359d520 gate 1578074230286954000 evaluation fails
[76df 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[76e0 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[76e1 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[76e2 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[76e3 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[76e4 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[76e5 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359de20 gate 1578074230287711100 evaluation starts
[76e6 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359de20 signed by 0 principal evaluation starts (used [false])
[76e7 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359de20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[76e8 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359de20 principal evaluation succeeds for identity 0
[76e9 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359de20 gate 1578074230287711100 evaluation succeeds
[76ea 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[76eb 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[76ec 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[76ed 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[76ee 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76ef 01-03 17:57:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76f0 01-03 17:57:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[76f1 01-03 17:57:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[76f2 01-03 17:57:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76f3 01-03 17:57:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76f4 01-03 17:57:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76f5 01-03 17:57:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76f6 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074228119632300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[76f7 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074228119632300 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[76f8 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76f9 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[76fa 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[76fb 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[76fc 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[76fd 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[76fe 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[76ff 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[7700 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[7701 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7702 01-03 17:57:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c9bb0 gate 1578074230389981500 evaluation starts
[7703 01-03 17:57:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c9bb0 signed by 0 principal evaluation starts (used [false])
[7704 01-03 17:57:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c9bb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7705 01-03 17:57:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c9bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7706 01-03 17:57:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c9bb0 principal evaluation fails
[7707 01-03 17:57:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c9bb0 gate 1578074230389981500 evaluation fails
[7708 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7709 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[770a 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[770b 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[770c 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[770d 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[770e 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e84b0 gate 1578074230472456800 evaluation starts
[770f 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e84b0 signed by 0 principal evaluation starts (used [false])
[7710 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e84b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7711 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e84b0 principal evaluation succeeds for identity 0
[7712 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e84b0 gate 1578074230472456800 evaluation succeeds
[7713 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7714 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7715 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7716 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7717 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7718 01-03 17:57:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7719 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[771a 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[771b 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[771c 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[771d 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[771e 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 ac ab 8d ec b4 49 e6 70 d5 6a 53 4f b7 52 43 |h.....I.p.jSO.RC|
00000010 bc f0 9c e8 4a ef 7b 88 22 34 58 c3 36 ea 1a 0a |....J.{."4X.6...|
[771f 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e ea ed fc 29 15 ac 21 e3 b7 1b 6a |0D. ....)..!...j|
00000010 ca 11 fe ad d0 3d 0e 06 95 0e c1 a8 24 de 6e e9 |.....=......$.n.|
00000020 8f 2c 0e b3 02 20 49 97 88 4e ed 32 10 94 38 cf |.,... I..N.2..8.|
00000030 70 95 7b e2 31 fa 9f e0 82 c2 94 bb 82 fe 65 08 |p.{.1.........e.|
00000040 d6 17 07 69 0c 6f |...i.o|
[7720 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7721 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354b450 gate 1578074230655742500 evaluation starts
[7722 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354b450 signed by 0 principal evaluation starts (used [false])
[7723 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354b450 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[7724 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354b450 principal evaluation succeeds for identity 0
[7725 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354b450 gate 1578074230655742500 evaluation succeeds
[7726 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[7727 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[7728 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[7729 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[772a 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [8] channel=businesschannel
[772b 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [8]
[772c 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[772d 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [8] channel=businesschannel
[772e 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4052 bytes, seq: 8}, Envelope: 4082 bytes, Signature: 0 bytes to the block puller
[772f 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Added 8, total items: 8
[7730 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]
[7731 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger
[7732 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [8] from buffer
[7733 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [8]
[7734 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [8]
[7735 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[7736 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002c3da40 env 0xc003b13770 txn 0
[7737 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003b13770
[7738 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\364\200\276\360\005\020\320\207\211\234\002\"\017businesschannel*@ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030W\034\373\331\217\266\300\325\352\000-\314\253<\031\243\342~\352|<O\302X"
[7739 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[773a 01-03 17:57:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[773b 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[773c 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[773d 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[773e 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 bb 2f da 88 8f 63 70 c3 f9 a2 79 a2 c0 70 b9 | ./...cp...y..p.|
00000010 e2 81 e2 0c d5 7a 7b 51 6e 7d 44 9e be 3f 12 59 |.....z{Qn}D..?.Y|
[773f 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 08 e2 32 23 06 3f 98 59 4c 87 0c |0D. (..2#.?.YL..|
00000010 08 4e 3d 6b bd eb 4b 35 22 f1 fb 42 22 f2 49 3a |.N=k..K5"..B".I:|
00000020 d7 57 f7 f8 02 20 07 2f b8 cb 77 d7 73 d2 23 f5 |.W... ./..w.s.#.|
00000030 74 c9 a9 6e 9e 67 f0 96 67 44 8d a9 8c 5a 6e 8c |t..n.g..gD...Zn.|
00000040 58 07 12 00 74 7b |X...t{|
[7740 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[7741 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003612000, header channel_header:"\010\003\032\014\010\364\200\276\360\005\020\320\207\211\234\002\"\017businesschannel*@ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030W\034\373\331\217\266\300\325\352\000-\314\253<\031\243\342~\352|<O\302X"
[7742 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[7743 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[7744 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7745 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7746 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7747 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[7748 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[7749 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[774a 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c]
[774b 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4052 bytes, seq: 8}, Envelope: 4082 bytes, Signature: 0 bytes to 1 peers
[774c 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x62, 0x64, 0x61, 0x66, 0x36, 0x62, 0x37, 0x65, 0x34, 0x61, 0x66, 0x37, 0x37, 0x63, 0x34, 0x31, 0x62, 0x62, 0x35, 0x33, 0x39, 0x63, 0x37, 0x36, 0x37, 0x33, 0x35, 0x65, 0x30, 0x64, 0x64, 0x38, 0x32, 0x61, 0x61, 0x65, 0x35, 0x65, 0x30, 0x39, 0x61, 0x64, 0x37, 0x37, 0x32, 0x39, 0x66, 0x62, 0x66, 0x38, 0x31, 0x36, 0x61, 0x37, 0x63, 0x64, 0x39, 0x62, 0x64, 0x64, 0x64, 0x39, 0x63}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x62, 0x64, 0x61, 0x66, 0x36, 0x62, 0x37, 0x65, 0x34, 0x61, 0x66, 0x37, 0x37, 0x63, 0x34, 0x31, 0x62, 0x62, 0x35, 0x33, 0x39, 0x63, 0x37, 0x36, 0x37, 0x33, 0x35, 0x65, 0x30, 0x64, 0x64, 0x38, 0x32, 0x61, 0x61, 0x65, 0x35, 0x65, 0x30, 0x39, 0x61, 0x64, 0x37, 0x37, 0x32, 0x39, 0x66, 0x62, 0x66, 0x38, 0x31, 0x36, 0x61, 0x37, 0x63, 0x64, 0x39, 0x62, 0x64, 0x64, 0x64, 0x39, 0x63, 0xff}]
[774d 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[774f 01-03 17:57:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4052 bytes, seq: 8}, Envelope: 4082 bytes, Signature: 0 bytes
[774e 01-03 17:57:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[7750 01-03 17:57:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc00360c000
[7751 01-03 17:57:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [da07a952-c31f-44e6-8c24-7147f4ee2baf]
[7752 01-03 17:57:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[7753 01-03 17:57:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7754 01-03 17:57:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7755 01-03 17:57:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7756 01-03 17:57:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo
[7757 01-03 17:57:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo
[7758 01-03 17:57:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections
[7759 01-03 17:57:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [da07a952-c31f-44e6-8c24-7147f4ee2baf]
[775a 01-03 17:57:10.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin
[775b 01-03 17:57:10.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [679c19ce-fa42-4cb6-b8fa-ea1de43acf67]
[775c 01-03 17:57:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [679c19ce-fa42-4cb6-b8fa-ea1de43acf67]
[775d 01-03 17:57:10.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 40 8f 4a 1b 93 e0 0a 13 ef 8f 54 75 d4 7b 4f |.@.J.......Tu.{O|
00000010 90 5a 51 bc af a9 72 b9 d1 b5 dd 35 89 6a 3b 40 |.ZQ...r....5.j;@|
[775e 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 5f 57 4b c0 82 59 6e b3 97 1d 95 |0D. W_WK..Yn....|
00000010 17 83 7f de f9 38 d9 03 f8 3e 78 91 3a e3 0f 0e |.....8...>x.:...|
00000020 7d 9b 02 47 02 20 22 11 82 e2 b8 30 72 04 15 21 |}..G. "....0r..!|
00000030 70 1a ed 77 00 0c 1a 01 3b 2f c2 6e 17 8a 83 e8 |p..w....;/.n....|
00000040 a8 dd 78 cf 96 c4 |..x...|
[775f 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7760 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003609260 gate 1578074230801463300 evaluation starts
[7761 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003609260 signed by 0 principal evaluation starts (used [false])
[7762 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003609260 processing identity 0 - &{Org1MSP 72d14a8ffb3355b2cd5ce4f5575706e3d93f82ccf34f87f37b6ede3c9fbcf9a5}
[7763 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003609260 principal evaluation succeeds for identity 0
[7764 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003609260 signed by 1 principal evaluation starts (used [true])
[7765 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003609260 skipping identity 0 because it has already been used
[7766 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003609260 principal evaluation fails
[7767 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003609260 gate 1578074230801463300 evaluation succeeds
[7768 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [01728bea-6db9-47aa-90ac-8ad0eea3c324]
[7769 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [01728bea-6db9-47aa-90ac-8ad0eea3c324]
[776a 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU block 8, namespace: exp02, tx 0 validation results is: <nil>
[776b 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c appears to be valid
[776c 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc00360c000
[776d 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002c3da40 env 0xc003b13770 txn 0
[776e 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[776f 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [8] in 148ms
[7770 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[7771 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[7772 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[7773 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [8] channel=businesschannel
[7774 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [8]
[7775 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[7776 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[7777 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[7778 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [8]
[7779 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[777a 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[777b 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[777c 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}
[777d 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[777e 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}
[777f 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7780 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}
[7781 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b
[7782 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}
[7783 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Block [8] Transaction index [0] TxId [ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c] marked as valid by state validator. ContainsPostOrderWrites [false]
[7784 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc000439640), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc000439680)}
[7785 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[7786 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[7787 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[7788 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [8]
[7789 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [8] to storage
[778a 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [8] to pvt block store
[778b 01-03 17:57:10.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [8]
[778c 01-03 17:57:10.81 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [8]
[778d 01-03 17:57:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=8, blockHash=[]byte{0x5b, 0x2f, 0x65, 0x5c, 0xbb, 0x82, 0xce, 0x3f, 0x6b, 0x52, 0x74, 0xd, 0x23, 0x93, 0xd7, 0xcf, 0x9d, 0xb1, 0xdb, 0x36, 0x8c, 0x7d, 0x4, 0x58, 0xd5, 0x73, 0x74, 0xa5, 0xd8, 0xda, 0xc8, 0xea} txOffsets=
txId=ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c locPointer=offset=70, bytesLength=3043
]
[778e 01-03 17:57:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=94964, bytesLength=3043] for tx ID: [ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c] to txid-index
[778f 01-03 17:57:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=94964, bytesLength=3043] for tx number:[0] ID: [ebdaf6b7e4af77c41bb539c76735e0dd82aae5e09ad7729fbf816a7cd9bddd9c] to blockNumTranNum index
[7790 01-03 17:57:10.83 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98968], isChainEmpty=[false], lastBlockNumber=[8]
[7791 01-03 17:57:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [8] transactions to state database
[7792 01-03 17:57:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[7793 01-03 17:57:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[7794 01-03 17:57:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[7795 01-03 17:57:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[7796 01-03 17:57:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02a] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]
[7797 01-03 17:57:10.84 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02b] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]
[7798 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[7799 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [9]
[779b 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]
[779a 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[779c 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [8] transactions to history database
[779d 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions
[779e 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [9]
[779f 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [8]
[77a0 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [8] with 1 transaction(s) in 49ms (state_validation=0ms block_and_pvtdata_commit=31ms state_commit=14ms) commitHash=[9425e325afacaa6eb12ede02935e666bcd814600332b8a739ba9bc1c7babccec]
[77a1 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6A121408908FF491D1C09CF315...2A0E08091A0A0A056578703032120131
[77a2 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9B6705EBC7E1394E8C1B1ECD6CBE457EFC718B04A6608E5E93556D4EF7A42238
[77a3 01-03 17:57:10.85 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [8] with 1 transaction(s)
[77a4 01-03 17:57:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57624
[77a5 01-03 17:57:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[77a6 01-03 17:57:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423 creator is valid
[77a7 01-03 17:57:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b cc 12 62 be 4e 25 29 0e af 2b 78 81 fd 0e eb |K..b.N%)..+x....|
00000010 5a ad f6 fb 3b db 7b e8 ce b8 a8 98 46 b7 c5 b9 |Z...;.{.....F...|
[77a8 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 2e cb 5e b4 92 84 99 19 1a d3 |0E.!....^.......|
00000010 d0 6c b9 49 8d b8 e6 79 fb fc 0b bf 7e 36 eb 58 |.l.I...y....~6.X|
00000020 a2 32 99 8b 12 02 20 2d a4 de a1 a4 0f 34 53 5e |.2.... -.....4S^|
00000030 83 6e 40 9a 13 15 d3 a8 4f fc 1f 5f 70 e2 86 26 |.n@.....O.._p..&|
00000040 b8 fe 1c 7c 31 3d 85 |...|1=.|
[77a9 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423 signature is valid
[77aa 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e71159bb] processing txid: e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423
[77ab 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423]
[77ac 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x37, 0x31, 0x31, 0x35, 0x39, 0x62, 0x62, 0x63, 0x65, 0x39, 0x31, 0x34, 0x38, 0x36, 0x37, 0x31, 0x37, 0x61, 0x34, 0x34, 0x32, 0x65, 0x61, 0x32, 0x62, 0x32, 0x32, 0x65, 0x38, 0x66, 0x63, 0x39, 0x31, 0x64, 0x62, 0x31, 0x66, 0x63, 0x34, 0x39, 0x34, 0x62, 0x39, 0x61, 0x31, 0x31, 0x35, 0x65, 0x33, 0x34, 0x30, 0x34, 0x34, 0x30, 0x37, 0x33, 0x65, 0x33, 0x38, 0x38, 0x34, 0x32, 0x33}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x37, 0x31, 0x31, 0x35, 0x39, 0x62, 0x62, 0x63, 0x65, 0x39, 0x31, 0x34, 0x38, 0x36, 0x37, 0x31, 0x37, 0x61, 0x34, 0x34, 0x32, 0x65, 0x61, 0x32, 0x62, 0x32, 0x32, 0x65, 0x38, 0x66, 0x63, 0x39, 0x31, 0x64, 0x62, 0x31, 0x66, 0x63, 0x34, 0x39, 0x34, 0x62, 0x39, 0x61, 0x31, 0x31, 0x35, 0x65, 0x33, 0x34, 0x30, 0x34, 0x34, 0x30, 0x37, 0x33, 0x65, 0x33, 0x38, 0x38, 0x34, 0x32, 0x33, 0xff}]
[77ad 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[77ae 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[77af 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[77b0 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[77b1 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[77b2 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b cc 12 62 be 4e 25 29 0e af 2b 78 81 fd 0e eb |K..b.N%)..+x....|
00000010 5a ad f6 fb 3b db 7b e8 ce b8 a8 98 46 b7 c5 b9 |Z...;.{.....F...|
[77b3 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 2e cb 5e b4 92 84 99 19 1a d3 |0E.!....^.......|
00000010 d0 6c b9 49 8d b8 e6 79 fb fc 0b bf 7e 36 eb 58 |.l.I...y....~6.X|
00000020 a2 32 99 8b 12 02 20 2d a4 de a1 a4 0f 34 53 5e |.2.... -.....4S^|
00000030 83 6e 40 9a 13 15 d3 a8 4f fc 1f 5f 70 e2 86 26 |.n@.....O.._p..&|
00000040 b8 fe 1c 7c 31 3d 85 |...|1=.|
[77b4 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[77b5 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036954f0 gate 1578074231114768800 evaluation starts
[77b6 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036954f0 signed by 0 principal evaluation starts (used [false])
[77b7 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036954f0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[77b8 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036954f0 principal evaluation succeeds for identity 0
[77b9 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036954f0 gate 1578074231114768800 evaluation succeeds
[77ba 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[77bb 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[77bc 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[77bd 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[77be 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[77bf 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423]
[77c0 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[77c1 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e71159bb] Entry chaincode: exp02
[77c2 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e71159bb] Entry chaincode: exp02
[77c3 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU [e71159bb] getting chaincode data for exp02 on channel businesschannel
[77c4 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[77c5 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[77c6 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[77c7 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU [e71159bb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[77c8 01-03 17:57:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU [e71159bb] handling GET_STATE from chaincode
[77c9 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU [e71159bb] getting state for chaincode exp02, key a, channel businesschannel
[77ca 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[77cb 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU [e71159bb] Completed GET_STATE. Sending RESPONSE
[77cc 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU [e71159bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[77cd 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU [e71159bb] notifying Txid:e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423, channelID:businesschannel
[77ce 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[77cf 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e71159bb] Exit chaincode: exp02 (6ms)
[77d0 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[77d1 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423]
[77d2 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e71159bb] Exit
[77d3 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e71159bb] escc for chaincode exp02 is escc
[77d4 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20DEA2DC46F148F35A03F6FA34DFFB...455254494649434154452D2D2D2D2D0A
[77d5 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 161BDB8E404073488BBD3A8D2C0599911076D588140600E3B5DAC6EBEF75EF9D
[77d6 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e71159bbce91486717a442ea2b22e8fc91db1fc494b9a115e34044073e388423]
[77d7 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57624
[77d8 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57624 grpc.code=OK grpc.call_duration=17.3454ms
[77d9 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[77da 01-03 17:57:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[77db 01-03 17:57:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[77dc 01-03 17:57:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[77dd 01-03 17:57:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315101E1801
[77de 01-03 17:57:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 43FC52964AB46549B3C493A202611F87098316878766D2775672A1870846CE2B
[77df 01-03 17:57:11.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[77e0 01-03 17:57:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77e1 01-03 17:57:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77e2 01-03 17:57:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77e3 01-03 17:57:11.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77e4 01-03 17:57:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:30 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[77e5 01-03 17:57:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77e6 01-03 17:57:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77e7 01-03 17:57:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:30 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[77e8 01-03 17:57:11.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77e9 01-03 17:57:11.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57628
[77ea 01-03 17:57:11.77 UTC] [%{longpkg}] %{callpath} -> DEBU cdc7b3ab6bd051be7fc5c9de6b8f91a82fbf60eb8f98b6279be986d82225e843 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[77eb 01-03 17:57:11.77 UTC] [%{longpkg}] %{callpath} -> DEBU cdc7b3ab6bd051be7fc5c9de6b8f91a82fbf60eb8f98b6279be986d82225e843 creator is valid
[77ec 01-03 17:57:11.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 ab b1 70 41 55 4f 62 19 44 a5 2c f5 87 27 aa |...pAUOb.D.,..'.|
00000010 35 93 09 5e b0 2a 34 27 62 49 ee 6d 79 31 73 f6 |5..^.*4'bI.my1s.|
[77ed 01-03 17:57:11.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 45 a1 66 40 fc f9 a2 ff 01 53 97 |0D. .E.f@.....S.|
00000010 c2 1b 63 9e ab 0f b6 bb ae 45 33 9f 63 19 19 13 |..c......E3.c...|
00000020 f7 26 c9 88 02 20 13 3a 3a 77 3a d6 9b a9 22 8a |.&... .::w:...".|
00000030 24 28 38 40 f9 0f 2a 24 e2 11 f8 b2 43 97 55 6a |$(8@..*$....C.Uj|
00000040 89 ca ff 44 9d d5 |...D..|
[77ee 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU cdc7b3ab6bd051be7fc5c9de6b8f91a82fbf60eb8f98b6279be986d82225e843 signature is valid
[77ef 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cdc7b3ab] processing txid: cdc7b3ab6bd051be7fc5c9de6b8f91a82fbf60eb8f98b6279be986d82225e843
[77f0 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [cdc7b3ab6bd051be7fc5c9de6b8f91a82fbf60eb8f98b6279be986d82225e843]
[77f1 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x64, 0x63, 0x37, 0x62, 0x33, 0x61, 0x62, 0x36, 0x62, 0x64, 0x30, 0x35, 0x31, 0x62, 0x65, 0x37, 0x66, 0x63, 0x35, 0x63, 0x39, 0x64, 0x65, 0x36, 0x62, 0x38, 0x66, 0x39, 0x31, 0x61, 0x38, 0x32, 0x66, 0x62, 0x66, 0x36, 0x30, 0x65, 0x62, 0x38, 0x66, 0x39, 0x38, 0x62, 0x36, 0x32, 0x37, 0x39, 0x62, 0x65, 0x39, 0x38, 0x36, 0x64, 0x38, 0x32, 0x32, 0x32, 0x35, 0x65, 0x38, 0x34, 0x33}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x63, 0x64, 0x63, 0x37, 0x62, 0x33, 0x61, 0x62, 0x36, 0x62, 0x64, 0x30, 0x35, 0x31, 0x62, 0x65, 0x37, 0x66, 0x63, 0x35, 0x63, 0x39, 0x64, 0x65, 0x36, 0x62, 0x38, 0x66, 0x39, 0x31, 0x61, 0x38, 0x32, 0x66, 0x62, 0x66, 0x36, 0x30, 0x65, 0x62, 0x38, 0x66, 0x39, 0x38, 0x62, 0x36, 0x32, 0x37, 0x39, 0x62, 0x65, 0x39, 0x38, 0x36, 0x64, 0x38, 0x32, 0x32, 0x32, 0x35, 0x65, 0x38, 0x34, 0x33, 0xff}]
[77f2 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cdc7b3ab] Entry chaincode: qscc
[77f3 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cdc7b3ab] Entry chaincode: qscc
[77f4 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU [cdc7b3ab] getting chaincode data for qscc on channel businesschannel
[77f5 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[77f6 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel
[77f7 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo
[77f8 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[77f9 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[77fa 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[77fb 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[77fc 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 ab b1 70 41 55 4f 62 19 44 a5 2c f5 87 27 aa |...pAUOb.D.,..'.|
00000010 35 93 09 5e b0 2a 34 27 62 49 ee 6d 79 31 73 f6 |5..^.*4'bI.my1s.|
[77fd 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 45 a1 66 40 fc f9 a2 ff 01 53 97 |0D. .E.f@.....S.|
00000010 c2 1b 63 9e ab 0f b6 bb ae 45 33 9f 63 19 19 13 |..c......E3.c...|
00000020 f7 26 c9 88 02 20 13 3a 3a 77 3a d6 9b a9 22 8a |.&... .::w:...".|
00000030 24 28 38 40 f9 0f 2a 24 e2 11 f8 b2 43 97 55 6a |$(8@..*$....C.Uj|
00000040 89 ca ff 44 9d d5 |...D..|
[77fe 01-03 17:57:11.78 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[77ff 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037458f0 gate 1578074231790047200 evaluation starts
[7800 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037458f0 signed by 0 principal evaluation starts (used [false])
[7801 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037458f0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[7802 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037458f0 principal evaluation succeeds for identity 0
[7803 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037458f0 gate 1578074231790047200 evaluation succeeds
[7804 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[7805 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7806 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7807 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7808 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU [cdc7b3ab] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7809 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU [cdc7b3ab] notifying Txid:cdc7b3ab6bd051be7fc5c9de6b8f91a82fbf60eb8f98b6279be986d82225e843, channelID:businesschannel
[780a 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[780b 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cdc7b3ab] Exit chaincode: qscc (7ms)
[780c 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cdc7b3ab] Exit
[780d 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cdc7b3ab] escc for chaincode qscc is escc
[780e 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A203433C936D347DA539BFFADAA4E87...455254494649434154452D2D2D2D2D0A
[780f 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7810 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7811 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7812 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7813 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 b2 ca 55 43 e2 5c d1 a3 4b e1 ef 2d 6d 44 2e | ..UC.\..K..-mD.|
00000010 05 93 9b cf 17 ef a2 a0 c7 c7 98 1e ed 42 29 e2 |.............B).|
[7814 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 65 60 d1 3a 2e e9 20 90 d3 bd 1b |0D. Ne`.:.. ....|
00000010 7a ae 60 ff 88 c1 0e 8c 27 78 90 63 12 a5 8e 40 |z.`.....'x.c...@|
00000020 b2 6a 1b ae 02 20 46 65 91 4e 3c a9 14 de f4 9e |.j... Fe.N<.....|
00000030 ec 0a fc 24 2f 4a c0 77 9a 0e 69 80 e1 bd 8b ad |...$/J.w..i.....|
00000040 d4 03 d3 fb 2d dd |....-.|
[7815 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7816 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 9f fc 76 a3 2a 68 ff 84 1c e1 |0E.!....v.*h....|
00000010 85 69 b9 79 1c 6f d8 c7 66 b7 fa 9f 2f 1c 78 4f |.i.y.o..f.../.xO|
00000020 a7 40 17 14 e7 02 20 3c 0a b6 d5 f3 a9 93 f2 f9 |.@.... <........|
00000030 48 fb 2b f3 84 91 0d 03 c5 f8 03 ba 5d 2f 0e 84 |H.+.........]/..|
00000040 af 3b 75 19 3e 05 de |.;u.>..|
[7817 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7818 01-03 17:57:11.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[7819 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84
[781a 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84
[781b 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[781c 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[781d 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[781e 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[781f 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7820 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7821 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7822 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7823 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7824 01-03 17:57:11.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7825 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7826 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7827 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7828 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7829 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[782a 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[782b 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[782c 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[782d 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[782e 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[782f 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7830 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7831 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7832 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7833 01-03 17:57:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6AD9556D837F1428A80FF270623DE13B06021A6B4D3BDC5329F87F59979C3700
[7834 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57628
[7835 01-03 17:57:11.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57628 grpc.code=OK grpc.call_duration=52.8238ms
[7836 01-03 17:57:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:2215497769980629695 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7837 01-03 17:57:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:2215497769980629695 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7838 01-03 17:57:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7839 01-03 17:57:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[783a 01-03 17:57:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[783b 01-03 17:57:11.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[783c 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[783d 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[783e 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[783f 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7840 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 84 31 6b 85 0d 3e f4 ef 5a 1b 09 eb c4 41 5f |..1k..>..Z....A_|
00000010 37 ad 2a e3 65 71 5b 7c 9b eb 1c 70 08 bb b5 0a |7.*.eq[|...p....|
[7841 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 90 c2 69 98 d5 01 fe e2 c7 31 |0E.!....i......1|
00000010 96 95 e0 32 cc 95 7e 0b 19 33 b6 b8 dc d9 f7 87 |...2..~..3......|
00000020 b7 c5 e8 00 3e 02 20 7e d9 d1 39 cd 53 df ce d1 |....>. ~..9.S...|
00000030 e4 34 49 85 0e 26 53 69 87 f0 08 a6 31 80 fb 43 |.4I..&Si....1..C|
00000040 bb be 82 c8 d2 e5 cc |.......|
[7842 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7843 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 d2 cd 31 38 41 df 74 97 aa 9e 50 |0D. 8..18A.t...P|
00000010 17 d2 aa 78 2c 1f 36 b3 a9 69 06 aa ff f0 8f 74 |...x,.6..i.....t|
00000020 89 44 ac 7e 02 20 79 68 f8 3c a9 3d a4 65 98 73 |.D.~. yh.<.=.e.s|
00000030 d8 12 6a a9 7e b3 14 c2 13 06 6c 70 af c8 8d 86 |..j.~.....lp....|
00000040 68 1d d7 d4 0d c4 |h.....|
[7844 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7845 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[7846 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85
[7847 01-03 17:57:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85
[7848 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[7849 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[784a 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[784b 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[784c 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[784d 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[784e 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[784f 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[7850 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[7851 01-03 17:57:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[7852 01-03 17:57:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7853 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57632
[7854 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 8d70072e4c6eedb228b3e02d81b583001a70f78b6599a774cb0e5164422f89dd creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[7855 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 8d70072e4c6eedb228b3e02d81b583001a70f78b6599a774cb0e5164422f89dd creator is valid
[7856 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 b6 9d 04 dc da b4 5b f2 4e da 8d 65 05 45 e3 |b......[.N..e.E.|
00000010 91 42 28 a9 fd 80 72 0f 09 0c 56 f4 59 ee ce 00 |.B(...r...V.Y...|
[7857 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 7c b1 22 de b6 46 c7 5f 18 ac 5f |0D. e|."..F._.._|
00000010 1c d2 63 df cf 0c 1a d8 76 fc ae 66 8e 11 0a 39 |..c.....v..f...9|
00000020 0e 72 3d 88 02 20 18 e3 a4 5f 15 ea ab 7e 21 b8 |.r=.. ..._...~!.|
00000030 0a 47 08 35 5c 75 0d ca de 0e 1b ea ed 01 5a ea |.G.5\u........Z.|
00000040 83 a5 49 03 80 62 |..I..b|
[7858 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 8d70072e4c6eedb228b3e02d81b583001a70f78b6599a774cb0e5164422f89dd signature is valid
[7859 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8d70072e] processing txid: 8d70072e4c6eedb228b3e02d81b583001a70f78b6599a774cb0e5164422f89dd
[785a 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8d70072e4c6eedb228b3e02d81b583001a70f78b6599a774cb0e5164422f89dd]
[785b 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x38, 0x64, 0x37, 0x30, 0x30, 0x37, 0x32, 0x65, 0x34, 0x63, 0x36, 0x65, 0x65, 0x64, 0x62, 0x32, 0x32, 0x38, 0x62, 0x33, 0x65, 0x30, 0x32, 0x64, 0x38, 0x31, 0x62, 0x35, 0x38, 0x33, 0x30, 0x30, 0x31, 0x61, 0x37, 0x30, 0x66, 0x37, 0x38, 0x62, 0x36, 0x35, 0x39, 0x39, 0x61, 0x37, 0x37, 0x34, 0x63, 0x62, 0x30, 0x65, 0x35, 0x31, 0x36, 0x34, 0x34, 0x32, 0x32, 0x66, 0x38, 0x39, 0x64, 0x64}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x38, 0x64, 0x37, 0x30, 0x30, 0x37, 0x32, 0x65, 0x34, 0x63, 0x36, 0x65, 0x65, 0x64, 0x62, 0x32, 0x32, 0x38, 0x62, 0x33, 0x65, 0x30, 0x32, 0x64, 0x38, 0x31, 0x62, 0x35, 0x38, 0x33, 0x30, 0x30, 0x31, 0x61, 0x37, 0x30, 0x66, 0x37, 0x38, 0x62, 0x36, 0x35, 0x39, 0x39, 0x61, 0x37, 0x37, 0x34, 0x63, 0x62, 0x30, 0x65, 0x35, 0x31, 0x36, 0x34, 0x34, 0x32, 0x32, 0x66, 0x38, 0x39, 0x64, 0x64, 0xff}]
[785c 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8d70072e] Entry chaincode: qscc
[785d 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8d70072e] Entry chaincode: qscc
[785e 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU [8d70072e] getting chaincode data for qscc on channel businesschannel
[785f 01-03 17:57:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7860 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel
[7861 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber
[7862 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[7863 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7864 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7865 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7866 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 b6 9d 04 dc da b4 5b f2 4e da 8d 65 05 45 e3 |b......[.N..e.E.|
00000010 91 42 28 a9 fd 80 72 0f 09 0c 56 f4 59 ee ce 00 |.B(...r...V.Y...|
[7867 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 7c b1 22 de b6 46 c7 5f 18 ac 5f |0D. e|."..F._.._|
00000010 1c d2 63 df cf 0c 1a d8 76 fc ae 66 8e 11 0a 39 |..c.....v..f...9|
00000020 0e 72 3d 88 02 20 18 e3 a4 5f 15 ea ab 7e 21 b8 |.r=.. ..._...~!.|
00000030 0a 47 08 35 5c 75 0d ca de 0e 1b ea ed 01 5a ea |.G.5\u........Z.|
00000040 83 a5 49 03 80 62 |..I..b|
[7868 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7869 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039191e0 gate 1578074232273060700 evaluation starts
[786a 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039191e0 signed by 0 principal evaluation starts (used [false])
[786b 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039191e0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[786c 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039191e0 principal evaluation succeeds for identity 0
[786d 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039191e0 gate 1578074232273060700 evaluation succeeds
[786e 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[786f 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7870 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7871 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7872 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2]
[7873 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47654]
[7874 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[51314], Going to peek [8] bytes
[7875 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[23765], placementInfo={fileNum=[0], startOffset=[47654], bytesOffset=[47657]}
[7876 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU [8d70072e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7877 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU [8d70072e] notifying Txid:8d70072e4c6eedb228b3e02d81b583001a70f78b6599a774cb0e5164422f89dd, channelID:businesschannel
[7878 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7879 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8d70072e] Exit chaincode: qscc (6ms)
[787a 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8d70072e] Exit
[787b 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8d70072e] escc for chaincode qscc is escc
[787c 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A205C0CD4DA13B7EBD3AC5D5CD56FFF...455254494649434154452D2D2D2D2D0A
[787d 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F3532E32A6C39132ADEBC7285A8B3D8CA352E17D8F81905609D3A26134AEE399
[787e 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57632
[787f 01-03 17:57:12.27 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57632 grpc.code=OK grpc.call_duration=10.3619ms
[7880 01-03 17:57:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7881 01-03 17:57:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:57632: read: connection reset by peer
[7882 01-03 17:57:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7883 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7884 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7885 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7886 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7887 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7888 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7889 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[788a 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[788b 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[788c 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[788d 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[788e 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[788f 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 8b 62 8d 06 1f 24 75 9b 82 6f 3a 89 0d d8 60 |..b...$u..o:...`|
00000010 67 a6 2b 55 1c ed 38 dd f5 1f 35 37 b0 f2 54 bb |g.+U..8...57..T.|
[7890 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 21 c0 0d 05 2e c9 bf cb 3e 65 c7 |0D. l!.......>e.|
00000010 a1 43 b1 84 01 ce 25 a9 e6 1c ac ba 97 59 e0 d7 |.C....%......Y..|
00000020 1a d8 94 b7 02 20 01 fa c6 45 95 ec d0 61 bf 2b |..... ...E...a.+|
00000030 1c 95 83 92 a5 44 27 c4 fb 0a c7 db f8 0c e1 17 |.....D'.........|
00000040 75 c2 44 a5 8e 80 |u.D...|
[7891 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7892 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003953e40 gate 1578074233002315300 evaluation starts
[7893 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003953e40 signed by 0 principal evaluation starts (used [false])
[7894 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003953e40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7895 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003953e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7896 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003953e40 principal evaluation fails
[7897 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003953e40 gate 1578074233002315300 evaluation fails
[7898 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7899 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[789a 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[789b 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 8b 62 8d 06 1f 24 75 9b 82 6f 3a 89 0d d8 60 |..b...$u..o:...`|
00000010 67 a6 2b 55 1c ed 38 dd f5 1f 35 37 b0 f2 54 bb |g.+U..8...57..T.|
[789c 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 21 c0 0d 05 2e c9 bf cb 3e 65 c7 |0D. l!.......>e.|
00000010 a1 43 b1 84 01 ce 25 a9 e6 1c ac ba 97 59 e0 d7 |.C....%......Y..|
00000020 1a d8 94 b7 02 20 01 fa c6 45 95 ec d0 61 bf 2b |..... ...E...a.+|
00000030 1c 95 83 92 a5 44 27 c4 fb 0a c7 db f8 0c e1 17 |.....D'.........|
00000040 75 c2 44 a5 8e 80 |u.D...|
[789d 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[789e 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ea740 gate 1578074233002878800 evaluation starts
[789f 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ea740 signed by 0 principal evaluation starts (used [false])
[78a0 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ea740 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[78a1 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ea740 principal evaluation succeeds for identity 0
[78a2 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ea740 gate 1578074233002878800 evaluation succeeds
[78a3 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[78a4 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[78a5 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[78a6 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[78a7 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[78a8 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes]}
[78a9 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82
[78aa 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82
[78ab 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[78ac 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78ad 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78ae 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78af 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78b0 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78b1 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78b2 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78b3 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78b4 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78b5 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78b6 01-03 17:57:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[78b7 01-03 17:57:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78b8 01-03 17:57:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[78b9 01-03 17:57:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[78ba 01-03 17:57:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78bb 01-03 17:57:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[78bc 01-03 17:57:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78bd 01-03 17:57:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[78be 01-03 17:57:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78bf 01-03 17:57:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[78c0 01-03 17:57:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78c1 01-03 17:57:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[78c2 01-03 17:57:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[78c3 01-03 17:57:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78c4 01-03 17:57:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[78c5 01-03 17:57:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78c6 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:18206263375717246735 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[78c7 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:18206263375717246735 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[78c8 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:18206263375717246735 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[78c9 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78ca 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78cb 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78cc 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78cd 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78ce 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78cf 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[78d0 01-03 17:57:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78d1 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:14981693047940873295 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[78d2 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[78d3 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14981693047940873295 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[78d4 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14981693047940873295 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[78d5 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78d6 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78d7 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78d8 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78d9 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78da 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78db 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[78dc 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78dd 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[78de 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[78df 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[78e0 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78e1 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[78e2 01-03 17:57:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[78e3 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[78e4 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[78e5 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[78e6 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[78e7 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 07 63 27 16 c3 19 82 c6 b9 ee d1 3b fb d0 f0 |..c'........;...|
00000010 9f ae 81 67 2b 29 09 81 71 32 dc 5e 52 d4 6a 01 |...g+)..q2.^R.j.|
[78e8 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 79 0b 21 3f 4c c6 9f dc 8d 4a 63 |0D. Ly.!?L....Jc|
00000010 cd c5 38 e1 2c e2 e9 3f 59 0f c5 72 47 d5 98 1d |..8.,..?Y..rG...|
00000020 bd 27 e8 9d 02 20 47 73 a3 b3 73 fa a6 07 db 99 |.'... Gs..s.....|
00000030 cb ec 99 ed bb 8d 85 64 9f 22 2d 4d c0 bf d2 b1 |.......d."-M....|
00000040 f7 e2 76 85 98 31 |..v..1|
[78e9 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[78ea 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2d70 gate 1578074233132538100 evaluation starts
[78eb 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2d70 signed by 0 principal evaluation starts (used [false])
[78ec 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2d70 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[78ed 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[78ee 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2d70 principal evaluation fails
[78ef 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2d70 gate 1578074233132538100 evaluation fails
[78f0 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[78f1 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[78f2 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[78f3 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 07 63 27 16 c3 19 82 c6 b9 ee d1 3b fb d0 f0 |..c'........;...|
00000010 9f ae 81 67 2b 29 09 81 71 32 dc 5e 52 d4 6a 01 |...g+)..q2.^R.j.|
[78f4 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 79 0b 21 3f 4c c6 9f dc 8d 4a 63 |0D. Ly.!?L....Jc|
00000010 cd c5 38 e1 2c e2 e9 3f 59 0f c5 72 47 d5 98 1d |..8.,..?Y..rG...|
00000020 bd 27 e8 9d 02 20 47 73 a3 b3 73 fa a6 07 db 99 |.'... Gs..s.....|
00000030 cb ec 99 ed bb 8d 85 64 9f 22 2d 4d c0 bf d2 b1 |.......d."-M....|
00000040 f7 e2 76 85 98 31 |..v..1|
[78f5 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[78f6 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3670 gate 1578074233133563800 evaluation starts
[78f7 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3670 signed by 0 principal evaluation starts (used [false])
[78f8 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3670 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[78f9 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3670 principal evaluation succeeds for identity 0
[78fa 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa3670 gate 1578074233133563800 evaluation succeeds
[78fb 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[78fc 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[78fd 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[78fe 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[78ff 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7900 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes]}
[7901 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84
[7902 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84
[7903 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[7904 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7905 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7906 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7907 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7908 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7909 01-03 17:57:13.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[790a 01-03 17:57:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[790b 01-03 17:57:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[790c 01-03 17:57:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[790d 01-03 17:57:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[790e 01-03 17:57:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[790f 01-03 17:57:13.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7910 01-03 17:57:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7911 01-03 17:57:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7912 01-03 17:57:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7913 01-03 17:57:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7914 01-03 17:57:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7915 01-03 17:57:13.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7916 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7917 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7918 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7919 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[791a 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[791b 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[791c 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[791d 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[791e 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[791f 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7920 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7921 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7922 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 d0 8b 0e cd 25 da 06 75 5b 9b 22 2d 52 02 ef |.....%..u[."-R..|
00000010 83 3e 04 a8 a2 9b 7a 67 d3 95 a2 a7 54 5d ad 2f |.>....zg....T]./|
[7923 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 13 29 95 fb 70 bc c5 46 6a c6 98 |0D. =.)..p..Fj..|
00000010 93 c0 42 9a 4a e5 2a b5 6a ef 37 ad 4c 85 41 df |..B.J.*.j.7.L.A.|
00000020 cb cf 51 6e 02 20 4c 27 22 fc 08 8d f2 dc 05 a1 |..Qn. L'".......|
00000030 c3 f1 e4 e0 3d 1d 65 b3 5e 8d b1 58 5d 58 be f8 |....=.e.^..X]X..|
00000040 af 10 18 a4 3a 1c |....:.|
[7924 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7925 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11720 gate 1578074233189869400 evaluation starts
[7926 01-03 17:57:13.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11720 signed by 0 principal evaluation starts (used [false])
[7927 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11720 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7928 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7929 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11720 principal evaluation fails
[792a 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11720 gate 1578074233189869400 evaluation fails
[792b 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[792c 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[792d 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[792e 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 d0 8b 0e cd 25 da 06 75 5b 9b 22 2d 52 02 ef |.....%..u[."-R..|
00000010 83 3e 04 a8 a2 9b 7a 67 d3 95 a2 a7 54 5d ad 2f |.>....zg....T]./|
[792f 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 13 29 95 fb 70 bc c5 46 6a c6 98 |0D. =.)..p..Fj..|
00000010 93 c0 42 9a 4a e5 2a b5 6a ef 37 ad 4c 85 41 df |..B.J.*.j.7.L.A.|
00000020 cb cf 51 6e 02 20 4c 27 22 fc 08 8d f2 dc 05 a1 |..Qn. L'".......|
00000030 c3 f1 e4 e0 3d 1d 65 b3 5e 8d b1 58 5d 58 be f8 |....=.e.^..X]X..|
00000040 af 10 18 a4 3a 1c |....:.|
[7930 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7931 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24020 gate 1578074233190770300 evaluation starts
[7932 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24020 signed by 0 principal evaluation starts (used [false])
[7933 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24020 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7934 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24020 principal evaluation succeeds for identity 0
[7935 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24020 gate 1578074233190770300 evaluation succeeds
[7936 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7937 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7938 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7939 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[793a 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes
[793b 01-03 17:57:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes]}
[793c 01-03 17:57:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85
[793d 01-03 17:57:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85
[793e 01-03 17:57:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[793f 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7940 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7941 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7942 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7943 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7944 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7945 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7946 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7947 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151051
[7948 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0757EF56A1A4D6FB0442C72B64D6179EA47D4D2A77DA72DE4172154FB5F0F6DE
[7949 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[794a 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[794b 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[794c 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[794d 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[794e 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[794f 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7950 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[7951 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7953 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7954 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7955 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7956 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7957 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[7958 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7959 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[795a 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[795b 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[795c 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[795d 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[795e 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[795f 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7960 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7961 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7962 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7963 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7964 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7965 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7952 01-03 17:57:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7966 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7967 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7968 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7969 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[796a 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[796b 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[796c 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d c0 0b ce b0 d0 eb 86 93 db 7d 5c 1b 00 28 c5 |..........}\..(.|
00000010 b9 ed d3 fa 8f de 9c 6f 78 c4 96 21 81 a8 57 b7 |.......ox..!..W.|
[796d 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 e2 09 1a 1f 3b 28 6f 2d 9c 87 |0E.!......;(o-..|
00000010 b1 3f 35 23 95 66 36 f8 40 d9 b9 35 48 da d5 e1 |.?5#.f6.@..5H...|
00000020 ed b6 67 fd f6 02 20 1a b7 6c 8e 98 5d a1 09 96 |..g... ..l..]...|
00000030 52 ad 93 a6 a4 c8 2b cb 49 ae f0 5a a6 1b 08 5d |R.....+.I..Z...]|
00000040 eb 22 c4 69 49 20 4d |.".iI M|
[796e 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[796f 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b55a50 gate 1578074233240920800 evaluation starts
[7970 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b55a50 signed by 0 principal evaluation starts (used [false])
[7971 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b55a50 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7972 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b55a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7973 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b55a50 principal evaluation fails
[7974 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b55a50 gate 1578074233240920800 evaluation fails
[7975 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7976 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7977 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7978 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7979 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d c0 0b ce b0 d0 eb 86 93 db 7d 5c 1b 00 28 c5 |..........}\..(.|
00000010 b9 ed d3 fa 8f de 9c 6f 78 c4 96 21 81 a8 57 b7 |.......ox..!..W.|
[797a 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 e2 09 1a 1f 3b 28 6f 2d 9c 87 |0E.!......;(o-..|
00000010 b1 3f 35 23 95 66 36 f8 40 d9 b9 35 48 da d5 e1 |.?5#.f6.@..5H...|
00000020 ed b6 67 fd f6 02 20 1a b7 6c 8e 98 5d a1 09 96 |..g... ..l..]...|
00000030 52 ad 93 a6 a4 c8 2b cb 49 ae f0 5a a6 1b 08 5d |R.....+.I..Z...]|
00000040 eb 22 c4 69 49 20 4d |.".iI M|
[797b 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[797c 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66350 gate 1578074233241590600 evaluation starts
[797d 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66350 signed by 0 principal evaluation starts (used [false])
[797e 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66350 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[797f 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66350 principal evaluation succeeds for identity 0
[7980 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66350 gate 1578074233241590600 evaluation succeeds
[7981 01-03 17:57:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7982 01-03 17:57:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7983 01-03 17:57:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7984 01-03 17:57:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7985 01-03 17:57:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[7986 01-03 17:57:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes]}
[7987 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83
[7988 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83
[7989 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[798a 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[798b 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[798c 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[798d 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[798e 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[798f 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7526727661295868652 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7990 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[7991 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9056861516534003326 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7992 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[7993 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6269865441592444340 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7994 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6269865441592444340 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7995 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7996 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7526727661295868652 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7997 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7998 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9056861516534003326 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7999 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[799a 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9056861516534003326 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[799b 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9056861516534003326 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[799c 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[799d 01-03 17:57:13.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[799e 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[799f 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79a0 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[79a1 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[79a2 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[79a3 01-03 17:57:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79a4 01-03 17:57:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7526727661295868652 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[79a5 01-03 17:57:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7526727661295868652 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[79a6 01-03 17:57:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7526727661295868652 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[79a7 01-03 17:57:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79a8 01-03 17:57:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6269865441592444340 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[79a9 01-03 17:57:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6269865441592444340 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[79aa 01-03 17:57:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6269865441592444340 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[79ab 01-03 17:57:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79ac 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79ad 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79ae 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[79af 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[79b0 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79b1 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[79b2 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79b3 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[79b4 01-03 17:57:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79b5 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 774 bytes, Signature: 0 bytes
[79b6 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b2 84 07 97 60 c3 ca c4 b8 26 fa a8 b9 65 9f |-....`....&...e.|
00000010 51 8c 9b df 09 a3 d7 0e 3e 93 13 18 e5 2b 42 a7 |Q.......>....+B.|
[79b7 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 8d 40 76 64 ed db 3e c2 1a 4a |0E.!...@vd..>..J|
00000010 11 15 33 0b 41 d4 01 4c 32 bd 94 84 00 33 8e 4e |..3.A..L2....3.N|
00000020 6a f4 09 0d 7b 02 20 77 a5 22 6c 41 fe ed da cf |j...{. w."lA....|
00000030 c9 77 59 67 9b 67 9f 9c f3 9a 02 16 1c 6b 85 f8 |.wYg.g.......k..|
00000040 60 8c 90 f1 40 cf ed |`...@..|
[79b8 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79b9 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79ba 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[79bb 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[79bc 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[79bd 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[79be 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[79bf 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[79c0 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[79c1 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[79c2 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[79c3 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4250 gate 1578074233384835400 evaluation starts
[79c4 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4250 signed by 0 principal evaluation starts (used [false])
[79c5 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4250 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[79c6 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[79c7 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4250 principal evaluation fails
[79c8 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4250 gate 1578074233384835400 evaluation fails
[79c9 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[79ca 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[79cb 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[79cc 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[79cd 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[79ce 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[79cf 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4b50 gate 1578074233386864800 evaluation starts
[79d0 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4b50 signed by 0 principal evaluation starts (used [false])
[79d1 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4b50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[79d2 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4b50 principal evaluation succeeds for identity 0
[79d3 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba4b50 gate 1578074233386864800 evaluation succeeds
[79d4 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[79d5 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[79d6 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[79d7 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[79d8 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79d9 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79da 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[79db 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[79dc 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[79dd 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[79de 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[79df 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[79e0 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[79e1 01-03 17:57:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[79e2 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[79e3 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bba5b0 gate 1578074233390159900 evaluation starts
[79e4 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 774 bytes, Signature: 0 bytes
[79e5 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79e6 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79e7 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074230857937800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes to 3 peers
[79e8 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79e9 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79ea 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074230857937800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[79eb 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79ec 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074230857937800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[79ed 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79ee 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074230857937800 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[79ef 01-03 17:57:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79f0 01-03 17:57:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 774 bytes, Signature: 0 bytes
[79f1 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bba5b0 signed by 0 principal evaluation starts (used [false])
[79f2 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bba5b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[79f3 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bba5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[79f4 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bba5b0 principal evaluation fails
[79f6 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bba5b0 gate 1578074233390159900 evaluation fails
[79f7 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[79f8 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[79f9 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[79f5 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151052
[79fa 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3AFE9DE909FF546AFBF8A7B1D9EDA5FA6B30508483690DA66E1D2E69DC36E366
[79fb 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[79fc 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[79fd 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79fe 01-03 17:57:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[79ff 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a00 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[7a01 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[7a02 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[7a05 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a03 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7a06 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a04 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7a07 01-03 17:57:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a08 01-03 17:57:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[7a09 01-03 17:57:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[7a0a 01-03 17:57:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a0b 01-03 17:57:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbaeb0 gate 1578074233439264200 evaluation starts
[7a0c 01-03 17:57:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbaeb0 signed by 0 principal evaluation starts (used [false])
[7a0d 01-03 17:57:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbaeb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7a0e 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbaeb0 principal evaluation succeeds for identity 0
[7a0f 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbaeb0 gate 1578074233439264200 evaluation succeeds
[7a10 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7a11 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7a12 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7a13 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7a14 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[7a15 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[7a16 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7a17 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7a18 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7a19 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7a1a 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7a1b 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[7a1c 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[7a1d 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a1e 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea470 gate 1578074233449361100 evaluation starts
[7a1f 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea470 signed by 0 principal evaluation starts (used [false])
[7a20 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea470 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[7a21 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea470 principal evaluation succeeds for identity 0
[7a22 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea470 gate 1578074233449361100 evaluation succeeds
[7a23 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[7a24 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7a25 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7a26 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7a27 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a28 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 774 bytes, Signature: 0 bytes
[7a29 01-03 17:57:13.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a2a 01-03 17:57:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b2 84 07 97 60 c3 ca c4 b8 26 fa a8 b9 65 9f |-....`....&...e.|
00000010 51 8c 9b df 09 a3 d7 0e 3e 93 13 18 e5 2b 42 a7 |Q.......>....+B.|
[7a2b 01-03 17:57:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 8d 40 76 64 ed db 3e c2 1a 4a |0E.!...@vd..>..J|
00000010 11 15 33 0b 41 d4 01 4c 32 bd 94 84 00 33 8e 4e |..3.A..L2....3.N|
00000020 6a f4 09 0d 7b 02 20 77 a5 22 6c 41 fe ed da cf |j...{. w."lA....|
00000030 c9 77 59 67 9b 67 9f 9c f3 9a 02 16 1c 6b 85 f8 |.wYg.g.......k..|
00000040 60 8c 90 f1 40 cf ed |`...@..|
[7a2c 01-03 17:57:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 2a 67 03 8a 7b fb 88 42 16 0a 03 da 7b 14 9e |.*g..{..B....{..|
00000010 09 b9 67 5f 87 ec 70 01 0f e8 1c f8 90 27 e7 ba |..g_..p......'..|
[7a2d 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 94 44 ef 05 dd 4f cd f6 6d 49 |0E.!...D...O..mI|
00000010 64 a7 9f 9a 34 04 f2 a3 37 fe 8d 4f ba de 54 39 |d...4...7..O..T9|
00000020 47 85 4e 9b aa 02 20 77 55 d4 1c 45 24 87 3e 5c |G.N... wU..E$.>\|
00000030 c7 37 c1 bc 8f 67 b3 81 ed 4d 1f 5c 6c 14 21 43 |.7...g...M.\l.!C|
00000040 13 60 4b 15 34 e0 d2 |.`K.4..|
[7a2e 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a2f 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a30 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7a31 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7a32 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7a33 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7a34 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7a35 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7a36 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[7a37 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[7a38 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a39 01-03 17:57:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c10ee0 gate 1578074233473904700 evaluation starts
[7a3a 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c10ee0 signed by 0 principal evaluation starts (used [false])
[7a3b 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c10ee0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7a3c 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c10ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7a3d 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c10ee0 principal evaluation fails
[7a3e 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c10ee0 gate 1578074233473904700 evaluation fails
[7a3f 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7a40 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7a41 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7a42 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd a4 f7 aa fe ce 0a d3 81 59 3d 24 81 d1 ca c9 |.........Y=$....|
00000010 86 20 e7 1e f9 06 6e b1 2e 81 b8 26 f1 35 18 46 |. ....n....&.5.F|
[7a43 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b2 30 30 3c 08 ae e2 96 be 4a |0E.!...00<.....J|
00000010 12 d7 ee d7 70 71 03 54 8f 95 e4 2c 99 f2 d4 d3 |....pq.T...,....|
00000020 6c c9 51 dc eb 02 20 68 2e fd db f0 5d 4b 8f 14 |l.Q... h....]K..|
00000030 af 9b d6 1d 65 5c 3b 52 86 b5 5e f3 d1 48 8b 51 |....e\;R..^..H.Q|
00000040 7d bf 22 d3 50 00 fc |}.".P..|
[7a44 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a45 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c117e0 gate 1578074233486720300 evaluation starts
[7a46 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c117e0 signed by 0 principal evaluation starts (used [false])
[7a47 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c117e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7a48 01-03 17:57:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c117e0 principal evaluation succeeds for identity 0
[7a49 01-03 17:57:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c117e0 gate 1578074233486720300 evaluation succeeds
[7a4a 01-03 17:57:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7a4b 01-03 17:57:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7a4c 01-03 17:57:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7a4d 01-03 17:57:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7a4e 01-03 17:57:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a4f 01-03 17:57:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a50 01-03 17:57:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7a51 01-03 17:57:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7a52 01-03 17:57:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7a53 01-03 17:57:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7a54 01-03 17:57:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7a55 01-03 17:57:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7a56 01-03 17:57:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7a57 01-03 17:57:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7a58 01-03 17:57:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7a59 01-03 17:57:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a5a 01-03 17:57:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d240 gate 1578074233536970000 evaluation starts
[7a5b 01-03 17:57:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d240 signed by 0 principal evaluation starts (used [false])
[7a5c 01-03 17:57:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d240 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7a5d 01-03 17:57:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7a5e 01-03 17:57:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d240 principal evaluation fails
[7a5f 01-03 17:57:13.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1d240 gate 1578074233536970000 evaluation fails
[7a60 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7a61 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7a62 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7a63 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7a64 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7a65 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a66 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1db40 gate 1578074233556013000 evaluation starts
[7a67 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1db40 signed by 0 principal evaluation starts (used [false])
[7a68 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1db40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7a69 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1db40 principal evaluation succeeds for identity 0
[7a6a 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1db40 gate 1578074233556013000 evaluation succeeds
[7a6b 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7a6c 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7a6d 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7a6e 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7a6f 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a70 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7a71 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7a72 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7a73 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7a74 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7a75 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7a76 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7a77 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a78 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c448d0 gate 1578074233557207400 evaluation starts
[7a79 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c448d0 signed by 0 principal evaluation starts (used [false])
[7a7a 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c448d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7a7b 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c448d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7a7c 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c448d0 principal evaluation fails
[7a7d 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c448d0 gate 1578074233557207400 evaluation fails
[7a7e 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7a7f 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7a80 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7a81 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7a82 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7a83 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a84 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c451d0 gate 1578074233557919400 evaluation starts
[7a85 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c451d0 signed by 0 principal evaluation starts (used [false])
[7a86 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c451d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7a87 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c451d0 principal evaluation succeeds for identity 0
[7a88 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c451d0 gate 1578074233557919400 evaluation succeeds
[7a89 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7a8a 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7a8b 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7a8c 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7a8d 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a8e 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 774 bytes, Signature: 0 bytes
[7a8f 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a90 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b2 84 07 97 60 c3 ca c4 b8 26 fa a8 b9 65 9f |-....`....&...e.|
00000010 51 8c 9b df 09 a3 d7 0e 3e 93 13 18 e5 2b 42 a7 |Q.......>....+B.|
[7a91 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 8d 40 76 64 ed db 3e c2 1a 4a |0E.!...@vd..>..J|
00000010 11 15 33 0b 41 d4 01 4c 32 bd 94 84 00 33 8e 4e |..3.A..L2....3.N|
00000020 6a f4 09 0d 7b 02 20 77 a5 22 6c 41 fe ed da cf |j...{. w."lA....|
00000030 c9 77 59 67 9b 67 9f 9c f3 9a 02 16 1c 6b 85 f8 |.wYg.g.......k..|
00000040 60 8c 90 f1 40 cf ed |`...@..|
[7a92 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 2a 67 03 8a 7b fb 88 42 16 0a 03 da 7b 14 9e |.*g..{..B....{..|
00000010 09 b9 67 5f 87 ec 70 01 0f e8 1c f8 90 27 e7 ba |..g_..p......'..|
[7a93 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 94 44 ef 05 dd 4f cd f6 6d 49 |0E.!...D...O..mI|
00000010 64 a7 9f 9a 34 04 f2 a3 37 fe 8d 4f ba de 54 39 |d...4...7..O..T9|
00000020 47 85 4e 9b aa 02 20 77 55 d4 1c 45 24 87 3e 5c |G.N... wU..E$.>\|
00000030 c7 37 c1 bc 8f 67 b3 81 ed 4d 1f 5c 6c 14 21 43 |.7...g...M.\l.!C|
00000040 13 60 4b 15 34 e0 d2 |.`K.4..|
[7a94 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a95 01-03 17:57:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a96 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7a97 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7a98 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7a99 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7a9a 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7a9b 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7a9c 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[7a9d 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[7a9e 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a9f 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7aa0 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7aa1 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[7aa2 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7aa3 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7aa4 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7988788406128652026 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[7aa5 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7988788406128652026 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[7aa6 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7aa7 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6fc40 gate 1578074233562793300 evaluation starts
[7aa8 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6fc40 signed by 0 principal evaluation starts (used [false])
[7aa9 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6fc40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7aaa 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6fc40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7aab 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6fc40 principal evaluation fails
[7aac 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6fc40 gate 1578074233562793300 evaluation fails
[7aad 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7aae 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7aaf 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7ab0 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 99 f6 ea da 1a a8 e8 07 ac d8 e9 0e 32 2e 70 |`............2.p|
00000010 60 b9 5a e7 68 a4 4a e6 4a 89 b5 39 29 70 05 1d |`.Z.h.J.J..9)p..|
[7ab1 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 50 b5 8a 25 bd ee 3c 7d 56 c8 |0E.!..P..%..<}V.|
00000010 d2 8c f2 85 f1 3e 16 d2 c8 64 45 aa 72 53 ed fe |.....>...dE.rS..|
00000020 0d 85 b3 a0 f9 02 20 25 e2 1b 89 13 f4 d6 c9 42 |...... %.......B|
00000030 1a da 53 91 af 42 c1 68 e2 ea 7c e3 6f d3 0f 38 |..S..B.h..|.o..8|
00000040 ad cc 22 2f 60 11 73 |.."/`.s|
[7ab2 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ab3 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c94540 gate 1578074233569598200 evaluation starts
[7ab4 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c94540 signed by 0 principal evaluation starts (used [false])
[7ab5 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c94540 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7ab6 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c94540 principal evaluation succeeds for identity 0
[7ab7 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c94540 gate 1578074233569598200 evaluation succeeds
[7ab8 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7ab9 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7aba 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7abb 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7abc 01-03 17:57:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7abd 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7abe 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7abf 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7ac0 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7ac1 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7ac2 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ac3 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ac4 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7ac5 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7ac6 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ac7 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c95fa0 gate 1578074233572096700 evaluation starts
[7ac8 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c95fa0 signed by 0 principal evaluation starts (used [false])
[7ac9 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c95fa0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7aca 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c95fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7acb 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c95fa0 principal evaluation fails
[7acc 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c95fa0 gate 1578074233572096700 evaluation fails
[7acd 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7ace 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7acf 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7ad0 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7ad1 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7ad2 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ad3 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb28a0 gate 1578074233573497800 evaluation starts
[7ad4 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb28a0 signed by 0 principal evaluation starts (used [false])
[7ad5 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb28a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7ad6 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb28a0 principal evaluation succeeds for identity 0
[7ad7 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb28a0 gate 1578074233573497800 evaluation succeeds
[7ad8 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7ad9 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7ada 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7adb 01-03 17:57:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7adc 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7add 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7ade 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7adf 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7ae0 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ae1 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ae2 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7ae3 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7ae4 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ae5 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3630 gate 1578074233580839700 evaluation starts
[7ae6 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3630 signed by 0 principal evaluation starts (used [false])
[7ae7 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3630 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7ae8 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7ae9 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3630 principal evaluation fails
[7aea 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3630 gate 1578074233580839700 evaluation fails
[7aeb 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7aec 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7aed 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7aee 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7aef 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7af0 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7af1 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3f30 gate 1578074233581668000 evaluation starts
[7af2 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3f30 signed by 0 principal evaluation starts (used [false])
[7af3 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3f30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7af4 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3f30 principal evaluation succeeds for identity 0
[7af5 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb3f30 gate 1578074233581668000 evaluation succeeds
[7af6 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7af7 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7af8 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7af9 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7afa 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7afb 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[7afc 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7afd 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7afe 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[7aff 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7b00 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a fe 9d e9 09 ff 54 6a fb f8 a7 b1 d9 ed a5 fa |:.....Tj........|
00000010 6b 30 50 84 83 69 0d a6 6e 1d 2e 69 dc 36 e3 66 |k0P..i..n..i.6.f|
[7b01 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 37 b4 03 40 cf 57 6d 75 63 c9 |0E.!..7..@.Wmuc.|
00000010 f7 63 f2 dc 10 0a 5c 4c 74 89 7a 55 e8 f0 d2 1e |.c....\Lt.zU....|
00000020 ac cb 21 c1 45 02 20 39 74 47 ef 2e 73 84 3a b8 |..!.E. 9tG..s.:.|
00000030 42 d3 5a 5c c9 88 85 3f 01 9c c6 47 16 c8 b9 6b |B.Z\...?...G...k|
00000040 98 09 20 ab 1c 6c f5 |.. ..l.|
[7b02 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[7b03 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 fb 9b f6 03 55 86 f2 81 60 94 fd |0D.!.....U...`..|
00000010 aa eb 6f 91 33 ce e3 23 55 85 10 88 a4 b9 71 69 |..o.3..#U.....qi|
00000020 8c ad 23 52 70 02 1f 13 a4 77 69 81 be b9 1c 97 |..#Rp....wi.....|
00000030 bf 12 c8 13 88 43 6a 31 d0 77 62 22 79 8d c1 d9 |.....Cj1.wb"y...|
00000040 83 1a 95 55 bd cf |...U..|
[7b04 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7b05 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7b06 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b07 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b08 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7b09 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7b0b 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b0c 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7b0a 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b0d 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7988788406128652026 , Msg_type: BLOCK_MSG, digests: [6 7 8 2 1 3 4 5], Envelope: 57 bytes, Signature: 0 bytes
[7b0e 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7988788406128652026 , Msg_type: BLOCK_MSG, digests: [6 7 8 2 1 3 4 5], Envelope: 57 bytes, Signature: 0 bytes
[7b0f 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b10 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7b11 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7b12 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7b13 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7b14 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7b15 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d c0 0b ce b0 d0 eb 86 93 db 7d 5c 1b 00 28 c5 |..........}\..(.|
00000010 b9 ed d3 fa 8f de 9c 6f 78 c4 96 21 81 a8 57 b7 |.......ox..!..W.|
[7b16 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 e2 09 1a 1f 3b 28 6f 2d 9c 87 |0E.!......;(o-..|
00000010 b1 3f 35 23 95 66 36 f8 40 d9 b9 35 48 da d5 e1 |.?5#.f6.@..5H...|
00000020 ed b6 67 fd f6 02 20 1a b7 6c 8e 98 5d a1 09 96 |..g... ..l..]...|
00000030 52 ad 93 a6 a4 c8 2b cb 49 ae f0 5a a6 1b 08 5d |R.....+.I..Z...]|
00000040 eb 22 c4 69 49 20 4d |.".iI M|
[7b17 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b18 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce11a0 gate 1578074233586922300 evaluation starts
[7b19 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce11a0 signed by 0 principal evaluation starts (used [false])
[7b1a 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce11a0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7b1b 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce11a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7b1c 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce11a0 principal evaluation fails
[7b1d 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce11a0 gate 1578074233586922300 evaluation fails
[7b1e 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7b1f 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7b20 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7b21 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d c0 0b ce b0 d0 eb 86 93 db 7d 5c 1b 00 28 c5 |..........}\..(.|
00000010 b9 ed d3 fa 8f de 9c 6f 78 c4 96 21 81 a8 57 b7 |.......ox..!..W.|
[7b22 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 e2 09 1a 1f 3b 28 6f 2d 9c 87 |0E.!......;(o-..|
00000010 b1 3f 35 23 95 66 36 f8 40 d9 b9 35 48 da d5 e1 |.?5#.f6.@..5H...|
00000020 ed b6 67 fd f6 02 20 1a b7 6c 8e 98 5d a1 09 96 |..g... ..l..]...|
00000030 52 ad 93 a6 a4 c8 2b cb 49 ae f0 5a a6 1b 08 5d |R.....+.I..Z...]|
00000040 eb 22 c4 69 49 20 4d |.".iI M|
[7b23 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b24 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1aa0 gate 1578074233589089900 evaluation starts
[7b25 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1aa0 signed by 0 principal evaluation starts (used [false])
[7b26 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1aa0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7b27 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1aa0 principal evaluation succeeds for identity 0
[7b28 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce1aa0 gate 1578074233589089900 evaluation succeeds
[7b29 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7b2a 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7b2b 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7b2c 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7b2d 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[7b2e 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b2f 01-03 17:57:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7b30 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a fe 9d e9 09 ff 54 6a fb f8 a7 b1 d9 ed a5 fa |:.....Tj........|
00000010 6b 30 50 84 83 69 0d a6 6e 1d 2e 69 dc 36 e3 66 |k0P..i..n..i.6.f|
[7b31 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 37 b4 03 40 cf 57 6d 75 63 c9 |0E.!..7..@.Wmuc.|
00000010 f7 63 f2 dc 10 0a 5c 4c 74 89 7a 55 e8 f0 d2 1e |.c....\Lt.zU....|
00000020 ac cb 21 c1 45 02 20 39 74 47 ef 2e 73 84 3a b8 |..!.E. 9tG..s.:.|
00000030 42 d3 5a 5c c9 88 85 3f 01 9c c6 47 16 c8 b9 6b |B.Z\...?...G...k|
00000040 98 09 20 ab 1c 6c f5 |.. ..l.|
[7b32 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[7b33 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[7b34 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b35 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7b36 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 84 31 6b 85 0d 3e f4 ef 5a 1b 09 eb c4 41 5f |..1k..>..Z....A_|
00000010 37 ad 2a e3 65 71 5b 7c 9b eb 1c 70 08 bb b5 0a |7.*.eq[|...p....|
[7b37 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 90 c2 69 98 d5 01 fe e2 c7 31 |0E.!....i......1|
00000010 96 95 e0 32 cc 95 7e 0b 19 33 b6 b8 dc d9 f7 87 |...2..~..3......|
00000020 b7 c5 e8 00 3e 02 20 7e d9 d1 39 cd 53 df ce d1 |....>. ~..9.S...|
00000030 e4 34 49 85 0e 26 53 69 87 f0 08 a6 31 80 fb 43 |.4I..&Si....1..C|
00000040 bb be 82 c8 d2 e5 cc |.......|
[7b38 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7b39 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b3a 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b3b 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7b3c 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7b3d 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b3e 01-03 17:57:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7b3f 01-03 17:57:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[7b40 01-03 17:57:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b41 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[7b42 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b43 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b44 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b45 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7b46 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7b47 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7b48 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7b49 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7b4a 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7b4b 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 d0 8b 0e cd 25 da 06 75 5b 9b 22 2d 52 02 ef |.....%..u[."-R..|
00000010 83 3e 04 a8 a2 9b 7a 67 d3 95 a2 a7 54 5d ad 2f |.>....zg....T]./|
[7b4c 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 13 29 95 fb 70 bc c5 46 6a c6 98 |0D. =.)..p..Fj..|
00000010 93 c0 42 9a 4a e5 2a b5 6a ef 37 ad 4c 85 41 df |..B.J.*.j.7.L.A.|
00000020 cb cf 51 6e 02 20 4c 27 22 fc 08 8d f2 dc 05 a1 |..Qn. L'".......|
00000030 c3 f1 e4 e0 3d 1d 65 b3 5e 8d b1 58 5d 58 be f8 |....=.e.^..X]X..|
00000040 af 10 18 a4 3a 1c |....:.|
[7b4d 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b4e 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d273f0 gate 1578074233627135900 evaluation starts
[7b4f 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d273f0 signed by 0 principal evaluation starts (used [false])
[7b50 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d273f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7b51 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d273f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7b52 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d273f0 principal evaluation fails
[7b53 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d273f0 gate 1578074233627135900 evaluation fails
[7b54 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7b55 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7b56 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7b57 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 d0 8b 0e cd 25 da 06 75 5b 9b 22 2d 52 02 ef |.....%..u[."-R..|
00000010 83 3e 04 a8 a2 9b 7a 67 d3 95 a2 a7 54 5d ad 2f |.>....zg....T]./|
[7b58 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 13 29 95 fb 70 bc c5 46 6a c6 98 |0D. =.)..p..Fj..|
00000010 93 c0 42 9a 4a e5 2a b5 6a ef 37 ad 4c 85 41 df |..B.J.*.j.7.L.A.|
00000020 cb cf 51 6e 02 20 4c 27 22 fc 08 8d f2 dc 05 a1 |..Qn. L'".......|
00000030 c3 f1 e4 e0 3d 1d 65 b3 5e 8d b1 58 5d 58 be f8 |....=.e.^..X]X..|
00000040 af 10 18 a4 3a 1c |....:.|
[7b59 01-03 17:57:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b5a 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d27cf0 gate 1578074233630230300 evaluation starts
[7b5b 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d27cf0 signed by 0 principal evaluation starts (used [false])
[7b5c 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d27cf0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7b5d 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d27cf0 principal evaluation succeeds for identity 0
[7b5e 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d27cf0 gate 1578074233630230300 evaluation succeeds
[7b5f 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7b60 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7b61 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7b62 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7b63 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes
[7b64 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b65 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7b66 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 84 31 6b 85 0d 3e f4 ef 5a 1b 09 eb c4 41 5f |..1k..>..Z....A_|
00000010 37 ad 2a e3 65 71 5b 7c 9b eb 1c 70 08 bb b5 0a |7.*.eq[|...p....|
[7b67 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 90 c2 69 98 d5 01 fe e2 c7 31 |0E.!....i......1|
00000010 96 95 e0 32 cc 95 7e 0b 19 33 b6 b8 dc d9 f7 87 |...2..~..3......|
00000020 b7 c5 e8 00 3e 02 20 7e d9 d1 39 cd 53 df ce d1 |....>. ~..9.S...|
00000030 e4 34 49 85 0e 26 53 69 87 f0 08 a6 31 80 fb 43 |.4I..&Si....1..C|
00000040 bb be 82 c8 d2 e5 cc |.......|
[7b68 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7b69 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b6a 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7b6b 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a fe 9d e9 09 ff 54 6a fb f8 a7 b1 d9 ed a5 fa |:.....Tj........|
00000010 6b 30 50 84 83 69 0d a6 6e 1d 2e 69 dc 36 e3 66 |k0P..i..n..i.6.f|
[7b6c 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 37 b4 03 40 cf 57 6d 75 63 c9 |0E.!..7..@.Wmuc.|
00000010 f7 63 f2 dc 10 0a 5c 4c 74 89 7a 55 e8 f0 d2 1e |.c....\Lt.zU....|
00000020 ac cb 21 c1 45 02 20 39 74 47 ef 2e 73 84 3a b8 |..!.E. 9tG..s.:.|
00000030 42 d3 5a 5c c9 88 85 3f 01 9c c6 47 16 c8 b9 6b |B.Z\...?...G...k|
00000040 98 09 20 ab 1c 6c f5 |.. ..l.|
[7b6d 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[7b6e 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[7b6f 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b70 01-03 17:57:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b71 01-03 17:57:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074230911067500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7b72 01-03 17:57:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[7b73 01-03 17:57:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[7b74 01-03 17:57:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b75 01-03 17:57:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074230911067500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7b76 01-03 17:57:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074230911067500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7b77 01-03 17:57:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[7b78 01-03 17:57:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[7b79 01-03 17:57:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b7a 01-03 17:57:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b7b 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57636
[7b7c 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU d0d97bffc5c0fc77ab18f95ce82b91b598629224d3fcb32c5f1dcc4cb23d3841 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[7b7d 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU d0d97bffc5c0fc77ab18f95ce82b91b598629224d3fcb32c5f1dcc4cb23d3841 creator is valid
[7b7e 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 e9 6d 65 65 f8 75 54 4c c2 d7 a2 f2 76 78 b9 |f.mee.uTL....vx.|
00000010 c1 2c 2c 6a 20 3f 55 d9 94 47 b5 73 ad e9 b7 32 |.,,j ?U..G.s...2|
[7b7f 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 cc 07 01 0b 84 82 70 ff 39 b9 |0E.!........p.9.|
00000010 c9 36 d9 7e a0 f9 3c 45 7d 05 8c ae 17 75 6d 90 |.6.~..<E}....um.|
00000020 41 a6 ee 0f e2 02 20 4b 6e 83 ec 87 09 a4 6e 77 |A..... Kn.....nw|
00000030 55 2d e9 43 b5 6a 00 78 fc a5 4a 33 7a 60 b9 14 |U-.C.j.x..J3z`..|
00000040 05 af 23 7e 59 21 cd |..#~Y!.|
[7b80 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU d0d97bffc5c0fc77ab18f95ce82b91b598629224d3fcb32c5f1dcc4cb23d3841 signature is valid
[7b81 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0d97bff] processing txid: d0d97bffc5c0fc77ab18f95ce82b91b598629224d3fcb32c5f1dcc4cb23d3841
[7b82 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d0d97bffc5c0fc77ab18f95ce82b91b598629224d3fcb32c5f1dcc4cb23d3841]
[7b83 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x64, 0x30, 0x64, 0x39, 0x37, 0x62, 0x66, 0x66, 0x63, 0x35, 0x63, 0x30, 0x66, 0x63, 0x37, 0x37, 0x61, 0x62, 0x31, 0x38, 0x66, 0x39, 0x35, 0x63, 0x65, 0x38, 0x32, 0x62, 0x39, 0x31, 0x62, 0x35, 0x39, 0x38, 0x36, 0x32, 0x39, 0x32, 0x32, 0x34, 0x64, 0x33, 0x66, 0x63, 0x62, 0x33, 0x32, 0x63, 0x35, 0x66, 0x31, 0x64, 0x63, 0x63, 0x34, 0x63, 0x62, 0x32, 0x33, 0x64, 0x33, 0x38, 0x34, 0x31}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x64, 0x30, 0x64, 0x39, 0x37, 0x62, 0x66, 0x66, 0x63, 0x35, 0x63, 0x30, 0x66, 0x63, 0x37, 0x37, 0x61, 0x62, 0x31, 0x38, 0x66, 0x39, 0x35, 0x63, 0x65, 0x38, 0x32, 0x62, 0x39, 0x31, 0x62, 0x35, 0x39, 0x38, 0x36, 0x32, 0x39, 0x32, 0x32, 0x34, 0x64, 0x33, 0x66, 0x63, 0x62, 0x33, 0x32, 0x63, 0x35, 0x66, 0x31, 0x64, 0x63, 0x63, 0x34, 0x63, 0x62, 0x32, 0x33, 0x64, 0x33, 0x38, 0x34, 0x31, 0xff}]
[7b84 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0d97bff] Entry chaincode: cscc
[7b85 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d0d97bff] Entry chaincode: cscc
[7b86 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU [d0d97bff] getting chaincode data for cscc on channel businesschannel
[7b87 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7b88 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock
[7b89 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock
[7b8a 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[7b8b 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7b8c 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7b8d 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7b8e 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 e9 6d 65 65 f8 75 54 4c c2 d7 a2 f2 76 78 b9 |f.mee.uTL....vx.|
00000010 c1 2c 2c 6a 20 3f 55 d9 94 47 b5 73 ad e9 b7 32 |.,,j ?U..G.s...2|
[7b8f 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 cc 07 01 0b 84 82 70 ff 39 b9 |0E.!........p.9.|
00000010 c9 36 d9 7e a0 f9 3c 45 7d 05 8c ae 17 75 6d 90 |.6.~..<E}....um.|
00000020 41 a6 ee 0f e2 02 20 4b 6e 83 ec 87 09 a4 6e 77 |A..... Kn.....nw|
00000030 55 2d e9 43 b5 6a 00 78 fc a5 4a 33 7a 60 b9 14 |U-.C.j.x..J3z`..|
00000040 05 af 23 7e 59 21 cd |..#~Y!.|
[7b90 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b91 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d69cc0 gate 1578074233783851900 evaluation starts
[7b92 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d69cc0 signed by 0 principal evaluation starts (used [false])
[7b93 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d69cc0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[7b94 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d69cc0 principal evaluation succeeds for identity 0
[7b95 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d69cc0 gate 1578074233783851900 evaluation succeeds
[7b96 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[7b97 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7b98 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7b99 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7b9a 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Getting config block
[7b9b 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [8]
[7b9c 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[94894]
[7b9d 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[4074], Going to peek [8] bytes
[7b9e 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[4072], placementInfo={fileNum=[0], startOffset=[94894], bytesOffset=[94896]}
[7b9f 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2]
[7ba0 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47654]
[7ba1 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[51314], Going to peek [8] bytes
[7ba2 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[23765], placementInfo={fileNum=[0], startOffset=[47654], bytesOffset=[47657]}
[7ba3 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got config block[2]
[7ba4 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU [d0d97bff] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7ba5 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU [d0d97bff] notifying Txid:d0d97bffc5c0fc77ab18f95ce82b91b598629224d3fcb32c5f1dcc4cb23d3841, channelID:businesschannel
[7ba6 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7ba7 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d0d97bff] Exit chaincode: cscc (3ms)
[7ba8 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0d97bff] Exit
[7ba9 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0d97bff] escc for chaincode cscc is escc
[7baa 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2036B6FF159DC2302BC77310087606...455254494649434154452D2D2D2D2D0A
[7bab 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BCC73E55232787E69A1D0CB44C46BCC276CCB7E78C51AED016A0AA3CC91374DE
[7bac 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57636
[7bad 01-03 17:57:13.78 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57636 grpc.code=OK grpc.call_duration=4.6107ms
[7bae 01-03 17:57:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074230911067500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7baf 01-03 17:57:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074230911067500 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7bb0 01-03 17:57:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[7bb1 01-03 17:57:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[7bb2 01-03 17:57:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bb3 01-03 17:57:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7bb4 01-03 17:57:13.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7bb5 01-03 17:57:13.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7bb6 01-03 17:57:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13764667078429911122 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[7bb7 01-03 17:57:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13764667078429911122 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[7bb8 01-03 17:57:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [8 1 2 3 4 5 6 7] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7bb9 01-03 17:57:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7bba 01-03 17:57:14.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57640
[7bbb 01-03 17:57:14.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0b81f2d5b514e3f5a210d4d4cb891f88c3813aa6fb91084840f4890c99706ff8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[7bbc 01-03 17:57:14.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0b81f2d5b514e3f5a210d4d4cb891f88c3813aa6fb91084840f4890c99706ff8 creator is valid
[7bbd 01-03 17:57:14.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 16 ac 52 f9 ec 2c 46 69 5d 49 c5 1d e8 11 08 |...R..,Fi]I.....|
00000010 7e b7 7a 4d cb dd af 39 78 e3 c9 c1 6b 1c aa 8f |~.zM...9x...k...|
[7bbe 01-03 17:57:14.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 63 0d cd 16 e6 e3 a4 9b 80 aa 3e |0D. .c.........>|
00000010 5f 6a 66 7e 0e 07 a1 38 fc 90 1d 27 f8 16 fb 69 |_jf~...8...'...i|
00000020 84 e3 70 cb 02 20 64 b5 dd 41 97 10 57 56 91 9c |..p.. d..A..WV..|
00000030 f7 39 89 30 c9 a0 a1 18 1f c7 bc 7c 11 ef 40 c9 |.9.0.......|..@.|
00000040 a0 d2 ef 64 1c 5b |...d.[|
[7bbf 01-03 17:57:14.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0b81f2d5b514e3f5a210d4d4cb891f88c3813aa6fb91084840f4890c99706ff8 signature is valid
[7bc0 01-03 17:57:14.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0b81f2d5] processing txid: 0b81f2d5b514e3f5a210d4d4cb891f88c3813aa6fb91084840f4890c99706ff8
[7bc1 01-03 17:57:14.07 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [0b81f2d5b514e3f5a210d4d4cb891f88c3813aa6fb91084840f4890c99706ff8]
[7bc2 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x30, 0x62, 0x38, 0x31, 0x66, 0x32, 0x64, 0x35, 0x62, 0x35, 0x31, 0x34, 0x65, 0x33, 0x66, 0x35, 0x61, 0x32, 0x31, 0x30, 0x64, 0x34, 0x64, 0x34, 0x63, 0x62, 0x38, 0x39, 0x31, 0x66, 0x38, 0x38, 0x63, 0x33, 0x38, 0x31, 0x33, 0x61, 0x61, 0x36, 0x66, 0x62, 0x39, 0x31, 0x30, 0x38, 0x34, 0x38, 0x34, 0x30, 0x66, 0x34, 0x38, 0x39, 0x30, 0x63, 0x39, 0x39, 0x37, 0x30, 0x36, 0x66, 0x66, 0x38}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x30, 0x62, 0x38, 0x31, 0x66, 0x32, 0x64, 0x35, 0x62, 0x35, 0x31, 0x34, 0x65, 0x33, 0x66, 0x35, 0x61, 0x32, 0x31, 0x30, 0x64, 0x34, 0x64, 0x34, 0x63, 0x62, 0x38, 0x39, 0x31, 0x66, 0x38, 0x38, 0x63, 0x33, 0x38, 0x31, 0x33, 0x61, 0x61, 0x36, 0x66, 0x62, 0x39, 0x31, 0x30, 0x38, 0x34, 0x38, 0x34, 0x30, 0x66, 0x34, 0x38, 0x39, 0x30, 0x63, 0x39, 0x39, 0x37, 0x30, 0x36, 0x66, 0x66, 0x38, 0xff}]
[7bc3 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0b81f2d5] Entry chaincode: cscc
[7bc4 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0b81f2d5] Entry chaincode: cscc
[7bc5 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU [0b81f2d5] getting chaincode data for cscc on channel businesschannel
[7bc6 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7bc7 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels
[7bc8 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 16 ac 52 f9 ec 2c 46 69 5d 49 c5 1d e8 11 08 |...R..,Fi]I.....|
00000010 7e b7 7a 4d cb dd af 39 78 e3 c9 c1 6b 1c aa 8f |~.zM...9x...k...|
[7bc9 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 63 0d cd 16 e6 e3 a4 9b 80 aa 3e |0D. .c.........>|
00000010 5f 6a 66 7e 0e 07 a1 38 fc 90 1d 27 f8 16 fb 69 |_jf~...8...'...i|
00000020 84 e3 70 cb 02 20 64 b5 dd 41 97 10 57 56 91 9c |..p.. d..A..WV..|
00000030 f7 39 89 30 c9 a0 a1 18 1f c7 bc 7c 11 ef 40 c9 |.9.0.......|..@.|
00000040 a0 d2 ef 64 1c 5b |...d.[|
[7bca 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU [0b81f2d5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7bcb 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU [0b81f2d5] notifying Txid:0b81f2d5b514e3f5a210d4d4cb891f88c3813aa6fb91084840f4890c99706ff8, channelID:businesschannel
[7bcc 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7bcd 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0b81f2d5] Exit chaincode: cscc (5ms)
[7bce 01-03 17:57:14.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0b81f2d5] Exit
[7bcf 01-03 17:57:14.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][0b81f2d5] escc for chaincode cscc is escc
[7bd0 01-03 17:57:14.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C85A1145152A873877B365D01988...455254494649434154452D2D2D2D2D0A
[7bd1 01-03 17:57:14.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[7bd2 01-03 17:57:14.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074230915130400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7bd3 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[7bd4 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bd5 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bd6 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bd7 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7bd8 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074230915130400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7bd9 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bda 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7bdb 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7bdc 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7bdd 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7bde 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7bdf 01-03 17:57:14.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7be0 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7be1 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7be2 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7be3 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123150 gate 1578074234126694700 evaluation starts
[7be4 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123150 signed by 0 principal evaluation starts (used [false])
[7be5 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123150 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7be6 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7be7 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123150 principal evaluation fails
[7bea 01-03 17:57:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123150 gate 1578074234126694700 evaluation fails
[7be8 01-03 17:57:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CCAA1DB1DBE1AE4BF7D9A416E7C9AD5AA8E329D675E4D7B27D0B37DF19752199
[7beb 01-03 17:57:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57640
[7bec 01-03 17:57:14.13 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57640 grpc.code=OK grpc.call_duration=60.6588ms
[7be9 01-03 17:57:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074230915130400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7bed 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7bee 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7bef 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7bf0 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7bf1 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7bf2 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7bf3 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7bf4 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7bf5 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123c20 gate 1578074234148447000 evaluation starts
[7bf6 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123c20 signed by 0 principal evaluation starts (used [false])
[7bf7 01-03 17:57:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123c20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7bf8 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123c20 principal evaluation succeeds for identity 0
[7bf9 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004123c20 gate 1578074234148447000 evaluation succeeds
[7bfa 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7bfb 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7bfc 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7bfd 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7bfe 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bff 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c00 01-03 17:57:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074230915130400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7c01 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c02 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7c03 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7c04 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7c05 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7c06 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7c07 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7c08 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7c09 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7c0a 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7c0b 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143860 gate 1578074234165692800 evaluation starts
[7c0c 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143860 signed by 0 principal evaluation starts (used [false])
[7c0d 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143860 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7c0e 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7c0f 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143860 principal evaluation fails
[7c10 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143860 gate 1578074234165692800 evaluation fails
[7c11 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7c12 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7c13 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7c14 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7c15 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7c16 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7c17 01-03 17:57:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415a160 gate 1578074234169277900 evaluation starts
[7c18 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415a160 signed by 0 principal evaluation starts (used [false])
[7c19 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415a160 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7c1a 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415a160 principal evaluation succeeds for identity 0
[7c1b 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415a160 gate 1578074234169277900 evaluation succeeds
[7c1c 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7c1d 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7c1e 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7c1f 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7c20 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c21 01-03 17:57:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c22 01-03 17:57:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[7c23 01-03 17:57:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[7c24 01-03 17:57:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c25 01-03 17:57:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c26 01-03 17:57:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c27 01-03 17:57:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c28 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074230926630100 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7c29 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074230926630100 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[7c2a 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c2b 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7c2c 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7c2d 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7c2e 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7c2f 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7c30 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7c31 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7c32 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7c33 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7c34 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a490 gate 1578074234369050200 evaluation starts
[7c35 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a490 signed by 0 principal evaluation starts (used [false])
[7c36 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a490 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7c37 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7c38 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a490 principal evaluation fails
[7c39 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a490 gate 1578074234369050200 evaluation fails
[7c3a 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7c3b 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7c3c 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7c3d 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7c3e 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7c3f 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7c40 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417ad90 gate 1578074234369640700 evaluation starts
[7c41 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417ad90 signed by 0 principal evaluation starts (used [false])
[7c42 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417ad90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7c43 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417ad90 principal evaluation succeeds for identity 0
[7c44 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417ad90 gate 1578074234369640700 evaluation succeeds
[7c45 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7c46 01-03 17:57:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7c47 01-03 17:57:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7c48 01-03 17:57:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7c49 01-03 17:57:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c4a 01-03 17:57:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c4b 01-03 17:57:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:10961898502290228825 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7c4c 01-03 17:57:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10961898502290228825 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7c4d 01-03 17:57:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7c4e 01-03 17:57:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c4f 01-03 17:57:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[7c50 01-03 17:57:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c51 01-03 17:57:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[7c52 01-03 17:57:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7c53 01-03 17:57:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 e8 8f 93 d3 df 14 6b 4c 2b 82 58 5a bc 4f bf |.......kL+.XZ.O.|
00000010 dc e7 81 90 33 1c f6 c3 16 2e 81 9b c0 df 67 32 |....3.........g2|
[7c54 01-03 17:57:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 5c cf 5b 9c a7 ab 94 83 4e 06 |0E.!..\.[.....N.|
00000010 8f 14 79 bd 9b 58 20 17 c9 de 3f 13 68 57 74 8f |..y..X ...?.hWt.|
00000020 fe 1a 7c f8 a6 02 20 46 c3 04 03 0c 62 44 20 bb |..|... F....bD .|
00000030 40 b5 a1 29 5b 26 aa 8c e8 a9 ea 63 04 05 39 2e |@..)[&.....c..9.|
00000040 ba a1 d0 81 dc db ed |.......|
[7c55 01-03 17:57:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7c56 01-03 17:57:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 68 86 dc 3f 6a 6e ec a5 68 57 f7 |0D. xh..?jn..hW.|
00000010 55 cd 6c 37 f3 98 cb 46 22 69 12 f4 58 17 7c 25 |U.l7...F"i..X.|%|
00000020 74 ff de 58 02 20 52 f8 59 0e f8 4d 60 7f 8f 41 |t..X. R.Y..M`..A|
00000030 52 5b eb 45 fc 9b 4e 3c 5d 71 0c 49 07 f3 ff cd |R[.E..N<]q.I....|
00000040 64 96 bd f7 b6 89 |d.....|
[7c57 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7c58 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[7c59 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:86
[7c5a 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:86
[7c5b 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[7c5c 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c5d 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c5e 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c5f 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7c60 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c61 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c62 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[7c63 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[7c64 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[7c65 01-03 17:57:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c66 01-03 17:57:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[7c67 01-03 17:57:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[7c68 01-03 17:57:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF315101F1801
[7c69 01-03 17:57:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 91363077EF21CAE441BD688EF2C7D7B465497BB56196FC3A2F3B5555E6002A34
[7c6a 01-03 17:57:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[7c6b 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c6c 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c6d 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c6e 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c6f 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:31 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[7c70 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c71 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c72 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:31 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[7c73 01-03 17:57:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c74 01-03 17:57:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7c75 01-03 17:57:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c76 01-03 17:57:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7c77 01-03 17:57:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7c78 01-03 17:57:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 2d 68 bc cd 0d 84 ee d4 cb 5f 62 60 2d e0 54 |.-h......._b`-.T|
00000010 e9 b2 99 e4 c5 d7 be 8e 0d 89 89 b1 c1 ba 6a 52 |..............jR|
[7c79 01-03 17:57:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 23 4c 24 cb 51 4b 3a 2b f5 dd 10 |0D. .#L$.QK:+...|
00000010 1e 17 d2 71 33 93 95 2b 66 b2 9d 17 de ec ec 5a |...q3..+f......Z|
00000020 b8 b3 01 06 02 20 65 e1 7b b8 33 4e b1 0c 27 bf |..... e.{.3N..'.|
00000030 11 1a f5 19 54 21 2a 56 6e cb 82 1a c9 49 e3 55 |....T!*Vn....I.U|
00000040 86 84 49 5f 87 2b |..I_.+|
[7c7a 01-03 17:57:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7c7b 01-03 17:57:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 e9 7a c6 23 7b 21 cd ac 45 b2 |0E.!...z.#{!..E.|
00000010 c9 11 cb 21 44 fb 02 95 f0 5d e9 93 09 1d e6 b0 |...!D....]......|
00000020 46 f7 5f cf 1f 02 20 6d 11 08 cb 77 ae 95 4e 83 |F._... m...w..N.|
00000030 5c dd d3 27 f7 2b 06 5c fd 3b ab 02 64 d9 12 c9 |\..'.+.\.;..d...|
00000040 77 15 0d a5 c3 70 ee |w....p.|
[7c7c 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7c7d 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[7c7e 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87
[7c7f 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87
[7c80 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[7c81 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c82 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c83 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c84 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c85 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c86 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c87 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7c88 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c8a 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7c8b 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7c8c 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c89 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7c8d 01-03 17:57:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c8e 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7c8f 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7c90 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c91 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7c92 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c93 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7c94 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7c95 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c96 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7c97 01-03 17:57:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c98 01-03 17:57:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:15826300758034556272 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7c99 01-03 17:57:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:15826300758034556272 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7c9a 01-03 17:57:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15826300758034556272 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7c9b 01-03 17:57:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c9c 01-03 17:57:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c9d 01-03 17:57:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c9e 01-03 17:57:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c9f 01-03 17:57:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ca0 01-03 17:57:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ca1 01-03 17:57:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[7ca2 01-03 17:57:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ca3 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13953185087739999434 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7ca4 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:13953185087739999434 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7ca5 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13953185087739999434 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7ca6 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ca7 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ca8 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ca9 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7caa 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cab 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cac 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[7cad 01-03 17:57:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cae 01-03 17:57:17.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7caf 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7cb0 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cb1 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7cb2 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[7cb3 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cb4 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7cb5 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7cb6 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7cb7 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7cb8 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7cb9 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7cba 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f c5 26 b4 36 36 39 16 ea fc 8e 4d 6b ee 64 92 |..&.669....Mk.d.|
00000010 27 b4 30 5e 0c 7c b3 ec 11 0c b8 cb 5e dc e9 91 |'.0^.|......^...|
[7cbb 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 ca d2 54 d6 f6 af b7 25 9a be 45 |0D. x..T....%..E|
00000010 63 9d 44 b2 dc e5 33 d1 e4 67 f4 1a a4 4c 50 76 |c.D...3..g...LPv|
00000020 53 bf c8 c2 02 20 3b 38 46 0e f2 e0 57 4b 41 cd |S.... ;8F...WKA.|
00000030 a3 5e dd 35 88 54 f5 15 60 c2 46 8b cf ab 94 b4 |.^.5.T..`.F.....|
00000040 31 44 ec ff ba ba |1D....|
[7cbc 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7cbd 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d1d40 gate 1578074237197328300 evaluation starts
[7cbe 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d1d40 signed by 0 principal evaluation starts (used [false])
[7cbf 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d1d40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7cc0 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d1d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7cc1 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d1d40 principal evaluation fails
[7cc2 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d1d40 gate 1578074237197328300 evaluation fails
[7cc3 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7cc4 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7cc5 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7cc6 01-03 17:57:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f c5 26 b4 36 36 39 16 ea fc 8e 4d 6b ee 64 92 |..&.669....Mk.d.|
00000010 27 b4 30 5e 0c 7c b3 ec 11 0c b8 cb 5e dc e9 91 |'.0^.|......^...|
[7cc7 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 ca d2 54 d6 f6 af b7 25 9a be 45 |0D. x..T....%..E|
00000010 63 9d 44 b2 dc e5 33 d1 e4 67 f4 1a a4 4c 50 76 |c.D...3..g...LPv|
00000020 53 bf c8 c2 02 20 3b 38 46 0e f2 e0 57 4b 41 cd |S.... ;8F...WKA.|
00000030 a3 5e dd 35 88 54 f5 15 60 c2 46 8b cf ab 94 b4 |.^.5.T..`.F.....|
00000040 31 44 ec ff ba ba |1D....|
[7cc8 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7cc9 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206640 gate 1578074237201550100 evaluation starts
[7cca 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206640 signed by 0 principal evaluation starts (used [false])
[7ccb 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206640 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7ccc 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206640 principal evaluation succeeds for identity 0
[7ccd 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206640 gate 1578074237201550100 evaluation succeeds
[7cce 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7ccf 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7cd0 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7cd1 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7cd2 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[7cd3 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes]}
[7cd4 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86
[7cd5 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86
[7cd6 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7cd7 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cd8 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cd9 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cda 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[7cdb 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cdc 01-03 17:57:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cdd 01-03 17:57:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cde 01-03 17:57:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[7cdf 01-03 17:57:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7ce0 01-03 17:57:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7ce1 01-03 17:57:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ce2 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7ce3 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7ce4 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ce5 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7ce6 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7ce7 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ce8 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7ce9 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7cea 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7ceb 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7cec 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ced 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7cee 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 c1 a2 b4 dc 5e 14 15 a1 a3 6d bf 82 1e d6 f1 |.....^....m.....|
00000010 11 b6 ac 92 40 17 9c 0b 5f 0e 9c 8b 88 e5 45 28 |....@..._.....E(|
[7cef 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd bb 0f 14 7b 0f a9 7f d5 e9 a1 |0E.!.....{......|
00000010 4b a5 5c 1c f3 20 d5 fa b0 18 ba 07 f6 b1 44 1d |K.\.. ........D.|
00000020 18 80 f2 11 8c 02 20 1d f6 29 10 ad 69 ca bd 61 |...... ..)..i..a|
00000030 2f f2 73 dc 47 a9 1a 7f 18 d4 5a bd 72 df b7 6e |/.s.G.....Z.r..n|
00000040 21 0e 61 9d b7 f3 a3 |!.a....|
[7cf0 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7cf1 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421cf70 gate 1578074237248270300 evaluation starts
[7cf2 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421cf70 signed by 0 principal evaluation starts (used [false])
[7cf3 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421cf70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7cf4 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421cf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7cf5 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421cf70 principal evaluation fails
[7cf6 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421cf70 gate 1578074237248270300 evaluation fails
[7cf7 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7cf8 01-03 17:57:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7cf9 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7cfa 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 c1 a2 b4 dc 5e 14 15 a1 a3 6d bf 82 1e d6 f1 |.....^....m.....|
00000010 11 b6 ac 92 40 17 9c 0b 5f 0e 9c 8b 88 e5 45 28 |....@..._.....E(|
[7cfb 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd bb 0f 14 7b 0f a9 7f d5 e9 a1 |0E.!.....{......|
00000010 4b a5 5c 1c f3 20 d5 fa b0 18 ba 07 f6 b1 44 1d |K.\.. ........D.|
00000020 18 80 f2 11 8c 02 20 1d f6 29 10 ad 69 ca bd 61 |...... ..)..i..a|
00000030 2f f2 73 dc 47 a9 1a 7f 18 d4 5a bd 72 df b7 6e |/.s.G.....Z.r..n|
00000040 21 0e 61 9d b7 f3 a3 |!.a....|
[7cfc 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7cfd 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d870 gate 1578074237253442500 evaluation starts
[7cfe 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d870 signed by 0 principal evaluation starts (used [false])
[7cff 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d870 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7d00 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d870 principal evaluation succeeds for identity 0
[7d01 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d870 gate 1578074237253442500 evaluation succeeds
[7d02 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7d03 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7d04 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d05 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7d06 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes
[7d07 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes]}
[7d08 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84
[7d09 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84
[7d0a 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[7d0b 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d0c 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d0d 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d0e 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[7d0f 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d10 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d11 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d12 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[7d13 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7d14 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7d15 01-03 17:57:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d16 01-03 17:57:17.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[7d17 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7462159710016101673 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7d18 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[7d19 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:73551480066098349 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7d1a 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[7d1b 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14898473496889392889 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[7d1c 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14898473496889392889 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7d1d 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d1e 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7462159710016101673 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7d1f 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d20 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:73551480066098349 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7d21 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d22 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14898473496889392889 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7d23 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14898473496889392889 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7d24 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14898473496889392889 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7d25 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d26 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7462159710016101673 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[7d27 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7462159710016101673 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[7d28 01-03 17:57:17.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d29 01-03 17:57:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 73551480066098349 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[7d2a 01-03 17:57:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 73551480066098349 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[7d2b 01-03 17:57:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 73551480066098349 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[7d2c 01-03 17:57:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d2d 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d2e 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d2f 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[7d30 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[7d31 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d32 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[7d33 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d34 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[7d35 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d36 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[7d37 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[7d38 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[7d39 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[7d3a 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[7d3b 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d3c 01-03 17:57:17.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d3d 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7d3e 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7d3f 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7d40 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7d41 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7d42 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7d43 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7d44 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7d45 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d46 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fab0 gate 1578074237381603400 evaluation starts
[7d47 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fab0 signed by 0 principal evaluation starts (used [false])
[7d48 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fab0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7d49 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7d4a 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fab0 principal evaluation fails
[7d4b 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fab0 gate 1578074237381603400 evaluation fails
[7d4c 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7d4d 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7d4e 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7d4f 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7d50 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7d51 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d52 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b83b0 gate 1578074237383368400 evaluation starts
[7d53 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b83b0 signed by 0 principal evaluation starts (used [false])
[7d54 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b83b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7d55 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b83b0 principal evaluation succeeds for identity 0
[7d56 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b83b0 gate 1578074237383368400 evaluation succeeds
[7d57 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7d58 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7d59 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d5a 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7d5b 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d5c 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d5d 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7d5e 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7d5f 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7d60 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[7d61 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7d62 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7d63 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7d64 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[7d65 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7d66 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7d67 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d68 01-03 17:57:17.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9e10 gate 1578074237389442600 evaluation starts
[7d69 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9e10 signed by 0 principal evaluation starts (used [false])
[7d6a 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9e10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7d6b 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7d6c 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9e10 principal evaluation fails
[7d6d 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9e10 gate 1578074237389442600 evaluation fails
[7d6e 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7d6f 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7d70 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7d71 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7d72 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7d73 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d74 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004245ec0 gate 1578074237398768400 evaluation starts
[7d75 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004245ec0 signed by 0 principal evaluation starts (used [false])
[7d76 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004245ec0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7d77 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004245ec0 principal evaluation succeeds for identity 0
[7d78 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004245ec0 gate 1578074237398768400 evaluation succeeds
[7d79 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7d7a 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7d7b 01-03 17:57:17.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d7c 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7d7d 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d7e 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[7d7f 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d80 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d81 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d82 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7d83 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7d84 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7d85 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7d86 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7d87 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7d88 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7d89 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7d8a 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d8b 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3bd0 gate 1578074237403046500 evaluation starts
[7d8c 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3bd0 signed by 0 principal evaluation starts (used [false])
[7d8d 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3bd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7d8e 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7d8f 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3bd0 principal evaluation fails
[7d90 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3bd0 gate 1578074237403046500 evaluation fails
[7d91 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7d92 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7d93 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7d94 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7d95 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7d96 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d97 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f24d0 gate 1578074237404967700 evaluation starts
[7d98 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f24d0 signed by 0 principal evaluation starts (used [false])
[7d99 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f24d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7d9a 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f24d0 principal evaluation succeeds for identity 0
[7d9b 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f24d0 gate 1578074237404967700 evaluation succeeds
[7d9c 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7d9d 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7d9e 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d9f 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7da0 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[7da1 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[7da2 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[7da3 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[7da4 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7da5 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7da6 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7da7 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7da8 01-03 17:57:17.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7da9 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7daa 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7dab 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7dac 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7dad 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7dae 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7daf 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310c90 gate 1578074237413185200 evaluation starts
[7db0 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310c90 signed by 0 principal evaluation starts (used [false])
[7db1 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310c90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7db2 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7db3 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310c90 principal evaluation fails
[7db4 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310c90 gate 1578074237413185200 evaluation fails
[7db5 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7db6 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7db7 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7db8 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7db9 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7dba 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7dbb 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311590 gate 1578074237415534400 evaluation starts
[7dbc 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311590 signed by 0 principal evaluation starts (used [false])
[7dbd 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311590 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7dbe 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311590 principal evaluation succeeds for identity 0
[7dbf 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311590 gate 1578074237415534400 evaluation succeeds
[7dc0 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7dc1 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7dc2 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7dc3 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7dc4 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7dc5 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[7dc6 01-03 17:57:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7dc7 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7dc8 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7dc9 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7dca 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7dcb 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7dcc 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7dcd 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7dce 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7dcf 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7dd0 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7dd1 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7dd2 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043292a0 gate 1578074237422669700 evaluation starts
[7dd3 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043292a0 signed by 0 principal evaluation starts (used [false])
[7dd4 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043292a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7dd5 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043292a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7dd6 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043292a0 principal evaluation fails
[7dd7 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043292a0 gate 1578074237422669700 evaluation fails
[7dd8 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7dd9 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7dda 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7ddb 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7ddc 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7ddd 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151053
[7dde 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82CDDED7FA11ED931C1D039A396D8C1F98CA1958172A9AFDE2734925783C0026
[7ddf 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7de0 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7de1 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[7de2 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7de3 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[7de4 01-03 17:57:17.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7de5 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[7de6 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7de7 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329ba0 gate 1578074237432032200 evaluation starts
[7de8 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329ba0 signed by 0 principal evaluation starts (used [false])
[7de9 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329ba0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7dea 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329ba0 principal evaluation succeeds for identity 0
[7deb 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329ba0 gate 1578074237432032200 evaluation succeeds
[7dec 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7ded 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7dee 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7def 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7df0 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7df1 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7df2 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[7df3 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[7df4 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7df5 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[7df6 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7df7 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7df8 01-03 17:57:17.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[7df9 01-03 17:57:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[7dfa 01-03 17:57:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7dfb 01-03 17:57:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7dfc 01-03 17:57:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7dfd 01-03 17:57:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7dfe 01-03 17:57:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7dff 01-03 17:57:17.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e00 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e01 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7e02 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e03 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7e05 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[7e04 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7e06 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e07 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380360 gate 1578074237451820200 evaluation starts
[7e08 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380360 signed by 0 principal evaluation starts (used [false])
[7e09 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380360 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7e0a 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7e0b 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380360 principal evaluation fails
[7e0c 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380360 gate 1578074237451820200 evaluation fails
[7e0d 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7e0e 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7e0f 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7e10 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[7e11 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[7e12 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e13 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380c60 gate 1578074237454312000 evaluation starts
[7e14 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380c60 signed by 0 principal evaluation starts (used [false])
[7e15 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380c60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7e16 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380c60 principal evaluation succeeds for identity 0
[7e17 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380c60 gate 1578074237454312000 evaluation succeeds
[7e18 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7e19 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7e1a 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7e1b 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7e1c 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e1d 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[7e1e 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e1f 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7e20 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[7e21 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7e22 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 cd de d7 fa 11 ed 93 1c 1d 03 9a 39 6d 8c 1f |............9m..|
00000010 98 ca 19 58 17 2a 9a fd e2 73 49 25 78 3c 00 26 |...X.*...sI%x<.&|
[7e23 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 40 8d ca c0 73 2c b6 b9 cf ab ec |0D. <@...s,.....|
00000010 62 50 98 ea 4b 12 b4 e4 38 3e 92 3f 9a 6b 05 6d |bP..K...8>.?.k.m|
00000020 32 a1 c3 e0 02 20 45 10 55 36 79 9c 01 59 d2 c1 |2.... E.U6y..Y..|
00000030 44 27 38 20 81 5c 29 fc 9f e6 eb 6e 16 a2 94 7d |D'8 .\)....n...}|
00000040 59 2d aa fb f0 92 |Y-....|
[7e24 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[7e25 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 3e 32 f8 6d 4f e6 fb 50 5b 18 0e |0D. 7>2.mO..P[..|
00000010 74 5f 28 ef 73 76 ca 88 30 85 f0 09 4a 69 ae 7f |t_(.sv..0...Ji..|
00000020 8f d3 7d 15 02 20 2a 4c 33 f2 ff 13 03 61 ea 8f |..}.. *L3....a..|
00000030 b1 d7 75 b0 99 59 69 52 d0 33 f5 e9 31 da da 8a |..u..YiR.3..1...|
00000040 c9 b8 34 90 68 d4 |..4.h.|
[7e26 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7e27 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7e28 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e29 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e2a 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7e2b 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7e2c 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e2d 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7e2e 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7e2f 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7e30 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e31 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e32 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e33 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 c1 a2 b4 dc 5e 14 15 a1 a3 6d bf 82 1e d6 f1 |.....^....m.....|
00000010 11 b6 ac 92 40 17 9c 0b 5f 0e 9c 8b 88 e5 45 28 |....@..._.....E(|
[7e35 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd bb 0f 14 7b 0f a9 7f d5 e9 a1 |0E.!.....{......|
00000010 4b a5 5c 1c f3 20 d5 fa b0 18 ba 07 f6 b1 44 1d |K.\.. ........D.|
00000020 18 80 f2 11 8c 02 20 1d f6 29 10 ad 69 ca bd 61 |...... ..)..i..a|
00000030 2f f2 73 dc 47 a9 1a 7f 18 d4 5a bd 72 df b7 6e |/.s.G.....Z.r..n|
00000040 21 0e 61 9d b7 f3 a3 |!.a....|
[7e36 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e37 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1ed0 gate 1578074237459481800 evaluation starts
[7e38 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1ed0 signed by 0 principal evaluation starts (used [false])
[7e39 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1ed0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7e3a 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7e3b 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1ed0 principal evaluation fails
[7e3c 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1ed0 gate 1578074237459481800 evaluation fails
[7e3d 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7e3e 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7e34 01-03 17:57:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e3f 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7e41 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 c1 a2 b4 dc 5e 14 15 a1 a3 6d bf 82 1e d6 f1 |.....^....m.....|
00000010 11 b6 ac 92 40 17 9c 0b 5f 0e 9c 8b 88 e5 45 28 |....@..._.....E(|
[7e42 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd bb 0f 14 7b 0f a9 7f d5 e9 a1 |0E.!.....{......|
00000010 4b a5 5c 1c f3 20 d5 fa b0 18 ba 07 f6 b1 44 1d |K.\.. ........D.|
00000020 18 80 f2 11 8c 02 20 1d f6 29 10 ad 69 ca bd 61 |...... ..)..i..a|
00000030 2f f2 73 dc 47 a9 1a 7f 18 d4 5a bd 72 df b7 6e |/.s.G.....Z.r..n|
00000040 21 0e 61 9d b7 f3 a3 |!.a....|
[7e43 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e44 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b48e0 gate 1578074237461394100 evaluation starts
[7e45 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b48e0 signed by 0 principal evaluation starts (used [false])
[7e40 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[7e46 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b48e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7e47 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b48e0 principal evaluation succeeds for identity 0
[7e48 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b48e0 gate 1578074237461394100 evaluation succeeds
[7e49 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7e4a 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7e4b 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7e4c 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7e4d 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes
[7e4e 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e4f 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7e50 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 cd de d7 fa 11 ed 93 1c 1d 03 9a 39 6d 8c 1f |............9m..|
00000010 98 ca 19 58 17 2a 9a fd e2 73 49 25 78 3c 00 26 |...X.*...sI%x<.&|
[7e51 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 40 8d ca c0 73 2c b6 b9 cf ab ec |0D. <@...s,.....|
00000010 62 50 98 ea 4b 12 b4 e4 38 3e 92 3f 9a 6b 05 6d |bP..K...8>.?.k.m|
00000020 32 a1 c3 e0 02 20 45 10 55 36 79 9c 01 59 d2 c1 |2.... E.U6y..Y..|
00000030 44 27 38 20 81 5c 29 fc 9f e6 eb 6e 16 a2 94 7d |D'8 .\)....n...}|
00000040 59 2d aa fb f0 92 |Y-....|
[7e52 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7e53 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7e54 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e55 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e56 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[7e57 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[7e58 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e59 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7e5a 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7e5b 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e5c 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7e5d 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e5e 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e5f 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e60 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f c5 26 b4 36 36 39 16 ea fc 8e 4d 6b ee 64 92 |..&.669....Mk.d.|
00000010 27 b4 30 5e 0c 7c b3 ec 11 0c b8 cb 5e dc e9 91 |'.0^.|......^...|
[7e61 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 ca d2 54 d6 f6 af b7 25 9a be 45 |0D. x..T....%..E|
00000010 63 9d 44 b2 dc e5 33 d1 e4 67 f4 1a a4 4c 50 76 |c.D...3..g...LPv|
00000020 53 bf c8 c2 02 20 3b 38 46 0e f2 e0 57 4b 41 cd |S.... ;8F...WKA.|
00000030 a3 5e dd 35 88 54 f5 15 60 c2 46 8b cf ab 94 b4 |.^.5.T..`.F.....|
00000040 31 44 ec ff ba ba |1D....|
[7e62 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e63 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e18a0 gate 1578074237464853300 evaluation starts
[7e64 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e18a0 signed by 0 principal evaluation starts (used [false])
[7e65 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e18a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7e66 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e18a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7e67 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e18a0 principal evaluation fails
[7e68 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e18a0 gate 1578074237464853300 evaluation fails
[7e69 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7e6a 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7e6b 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7e6c 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f c5 26 b4 36 36 39 16 ea fc 8e 4d 6b ee 64 92 |..&.669....Mk.d.|
00000010 27 b4 30 5e 0c 7c b3 ec 11 0c b8 cb 5e dc e9 91 |'.0^.|......^...|
[7e6d 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 ca d2 54 d6 f6 af b7 25 9a be 45 |0D. x..T....%..E|
00000010 63 9d 44 b2 dc e5 33 d1 e4 67 f4 1a a4 4c 50 76 |c.D...3..g...LPv|
00000020 53 bf c8 c2 02 20 3b 38 46 0e f2 e0 57 4b 41 cd |S.... ;8F...WKA.|
00000030 a3 5e dd 35 88 54 f5 15 60 c2 46 8b cf ab 94 b4 |.^.5.T..`.F.....|
00000040 31 44 ec ff ba ba |1D....|
[7e6e 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e6f 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f21a0 gate 1578074237465396200 evaluation starts
[7e70 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f21a0 signed by 0 principal evaluation starts (used [false])
[7e71 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f21a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7e72 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f21a0 principal evaluation succeeds for identity 0
[7e73 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f21a0 gate 1578074237465396200 evaluation succeeds
[7e74 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7e75 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7e76 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7e77 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7e78 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[7e79 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e7a 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[7e7b 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 cd de d7 fa 11 ed 93 1c 1d 03 9a 39 6d 8c 1f |............9m..|
00000010 98 ca 19 58 17 2a 9a fd e2 73 49 25 78 3c 00 26 |...X.*...sI%x<.&|
[7e7c 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 40 8d ca c0 73 2c b6 b9 cf ab ec |0D. <@...s,.....|
00000010 62 50 98 ea 4b 12 b4 e4 38 3e 92 3f 9a 6b 05 6d |bP..K...8>.?.k.m|
00000020 32 a1 c3 e0 02 20 45 10 55 36 79 9c 01 59 d2 c1 |2.... E.U6y..Y..|
00000030 44 27 38 20 81 5c 29 fc 9f e6 eb 6e 16 a2 94 7d |D'8 .\)....n...}|
00000040 59 2d aa fb f0 92 |Y-....|
[7e7d 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7e7e 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7e7f 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e80 01-03 17:57:17.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e81 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e82 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e83 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[7e84 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e85 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e86 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:149503379906610333 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[7e87 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:149503379906610333 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[7e88 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e89 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 149503379906610333 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 2 1 3 4], Envelope: 57 bytes, Signature: 0 bytes
[7e8a 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 149503379906610333 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 2 1 3 4], Envelope: 57 bytes, Signature: 0 bytes
[7e8b 01-03 17:57:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e8c 01-03 17:57:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[7e8d 01-03 17:57:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e8e 01-03 17:57:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e8f 01-03 17:57:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e90 01-03 17:57:17.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2495432636773955546 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[7e91 01-03 17:57:17.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2495432636773955546 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[7e92 01-03 17:57:17.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7e93 01-03 17:57:17.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e94 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7e95 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7e96 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e97 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7e98 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7e99 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e9a 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7e9b 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7e9c 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7e9d 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e9e 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e9f 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ea0 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 46 cd 97 a9 d8 cb 67 1a e5 a1 f6 bc 6d 4c c0 |.F.....g.....mL.|
00000010 38 58 09 51 07 53 0f c4 dd f8 0b 68 48 06 68 ad |8X.Q.S.....hH.h.|
[7ea1 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 c9 20 02 98 98 d4 94 df ff 6a |0E.!... .......j|
00000010 2c fb 77 a6 0d 38 a9 6f d0 d8 03 b4 e3 37 b3 87 |,.w..8.o.....7..|
00000020 a0 07 fe 40 c6 02 20 16 37 b8 9d 8a f8 a4 ab 85 |...@.. .7.......|
00000030 1e a2 b0 fd 8a 15 f1 de 31 b1 ce 7e 11 22 f5 0f |........1..~."..|
00000040 58 2f a0 4a bc 77 d3 |X/.J.w.|
[7ea2 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ea3 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cc10 gate 1578074237996702100 evaluation starts
[7ea4 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cc10 signed by 0 principal evaluation starts (used [false])
[7ea5 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cc10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7ea6 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cc10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7ea7 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cc10 principal evaluation fails
[7ea8 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cc10 gate 1578074237996702100 evaluation fails
[7ea9 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7eaa 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7eab 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7eac 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 46 cd 97 a9 d8 cb 67 1a e5 a1 f6 bc 6d 4c c0 |.F.....g.....mL.|
00000010 38 58 09 51 07 53 0f c4 dd f8 0b 68 48 06 68 ad |8X.Q.S.....hH.h.|
[7ead 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 c9 20 02 98 98 d4 94 df ff 6a |0E.!... .......j|
00000010 2c fb 77 a6 0d 38 a9 6f d0 d8 03 b4 e3 37 b3 87 |,.w..8.o.....7..|
00000020 a0 07 fe 40 c6 02 20 16 37 b8 9d 8a f8 a4 ab 85 |...@.. .7.......|
00000030 1e a2 b0 fd 8a 15 f1 de 31 b1 ce 7e 11 22 f5 0f |........1..~."..|
00000040 58 2f a0 4a bc 77 d3 |X/.J.w.|
[7eae 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7eaf 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442d510 gate 1578074237997121600 evaluation starts
[7eb0 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442d510 signed by 0 principal evaluation starts (used [false])
[7eb1 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442d510 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7eb2 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442d510 principal evaluation succeeds for identity 0
[7eb3 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442d510 gate 1578074237997121600 evaluation succeeds
[7eb4 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7eb5 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7eb6 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7eb7 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7eb8 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7eb9 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes]}
[7eba 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85
[7ebb 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85
[7ebc 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[7ebd 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ebe 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ebf 01-03 17:57:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ec0 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ec1 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ec2 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ec3 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ec4 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ec5 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ec6 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7ec7 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ec8 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ec9 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7eca 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ecb 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ecc 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ecd 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ece 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ecf 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ed0 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ed1 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ed2 01-03 17:57:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ed3 01-03 17:57:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ed4 01-03 17:57:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ed5 01-03 17:57:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ed6 01-03 17:57:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ed7 01-03 17:57:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[7ed8 01-03 17:57:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[7ed9 01-03 17:57:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7eda 01-03 17:57:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7edb 01-03 17:57:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7edc 01-03 17:57:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7edd 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7ede 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7edf 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ee0 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7ee1 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[7ee2 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ee3 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7ee4 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7ee5 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7ee6 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7ee7 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ee8 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ee9 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 96 d1 85 e8 60 22 e0 10 e3 58 aa 98 55 b8 45 |.....`"...X..U.E|
00000010 e5 13 1a 03 c5 78 fb e2 9f 88 4c 77 62 78 c5 4f |.....x....Lwbx.O|
[7eea 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 3d 8f 79 5d 65 b3 32 50 4c 25 76 |0D. O=.y]e.2PL%v|
00000010 14 66 ad 4f eb ea 3a 5e 69 b6 6e d1 32 50 67 46 |.f.O..:^i.n.2PgF|
00000020 d6 14 ad b1 02 20 2b 8d c2 78 d9 66 98 7f 3f 02 |..... +..x.f..?.|
00000030 5d 53 bc a2 08 e2 a9 0e 50 94 ca 43 0a 31 99 0d |]S......P..C.1..|
00000040 eb a2 be 9d 4d 95 |....M.|
[7eeb 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7eec 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443bb0 gate 1578074238131141600 evaluation starts
[7eed 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443bb0 signed by 0 principal evaluation starts (used [false])
[7eee 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443bb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7eef 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7ef0 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443bb0 principal evaluation fails
[7ef1 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004443bb0 gate 1578074238131141600 evaluation fails
[7ef2 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7ef3 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7ef4 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7ef5 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 96 d1 85 e8 60 22 e0 10 e3 58 aa 98 55 b8 45 |.....`"...X..U.E|
00000010 e5 13 1a 03 c5 78 fb e2 9f 88 4c 77 62 78 c5 4f |.....x....Lwbx.O|
[7ef6 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 3d 8f 79 5d 65 b3 32 50 4c 25 76 |0D. O=.y]e.2PL%v|
00000010 14 66 ad 4f eb ea 3a 5e 69 b6 6e d1 32 50 67 46 |.f.O..:^i.n.2PgF|
00000020 d6 14 ad b1 02 20 2b 8d c2 78 d9 66 98 7f 3f 02 |..... +..x.f..?.|
00000030 5d 53 bc a2 08 e2 a9 0e 50 94 ca 43 0a 31 99 0d |]S......P..C.1..|
00000040 eb a2 be 9d 4d 95 |....M.|
[7ef7 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ef8 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044de4b0 gate 1578074238131543400 evaluation starts
[7ef9 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044de4b0 signed by 0 principal evaluation starts (used [false])
[7efa 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044de4b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7efb 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044de4b0 principal evaluation succeeds for identity 0
[7efc 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044de4b0 gate 1578074238131543400 evaluation succeeds
[7efd 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7efe 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7eff 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7f00 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7f01 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7f02 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes]}
[7f03 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87
[7f04 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87
[7f05 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7f06 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f07 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f08 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f09 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f0a 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f0b 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f0c 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f0d 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f0e 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f0f 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7f10 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f11 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f12 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7f13 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7f14 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f15 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7f16 01-03 17:57:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f17 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7f18 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f19 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7f1a 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f1b 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7f1c 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7f1d 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f1e 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7f1f 01-03 17:57:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f20 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151054
[7f21 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6D77C8CA2EFE7468644EBB4E7E1B277B14391980D2B369824315B4E7D64D8E87
[7f22 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7f23 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7f24 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[7f25 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f26 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f27 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[7f28 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f29 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7f2a 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f2b 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7f2c 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7f2d 01-03 17:57:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f2e 01-03 17:57:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7f2f 01-03 17:57:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f30 01-03 17:57:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7f31 01-03 17:57:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f32 01-03 17:57:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[7f33 01-03 17:57:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[7f34 01-03 17:57:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f35 01-03 17:57:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f36 01-03 17:57:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f37 01-03 17:57:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f38 01-03 17:57:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:9718082245177322892 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7f39 01-03 17:57:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9718082245177322892 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7f3a 01-03 17:57:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7f3b 01-03 17:57:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f3c 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[7f3d 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f3e 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[7f3f 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[7f40 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 08 2b aa f0 d2 b6 7d c9 21 15 54 fb 1a fd f4 |..+....}.!.T....|
00000010 be 5d 47 d0 61 a8 8b 91 7b c7 ed 96 51 a0 ad df |.]G.a...{...Q...|
[7f41 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce bd 05 5b 45 38 5a ee 66 38 a4 |0E.!....[E8Z.f8.|
00000010 5f 25 78 8a 23 d7 29 01 e2 54 d4 3f 68 74 2a ee |_%x.#.)..T.?ht*.|
00000020 a2 0a 0b bb ac 02 20 6a b9 70 2c e5 04 39 0c 60 |...... j.p,..9.`|
00000030 5f e2 47 e2 84 ca 13 28 19 67 ed f0 2f 04 9a b5 |_.G....(.g../...|
00000040 05 84 4a 86 9a 79 0c |..J..y.|
[7f42 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7f43 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac ff b6 00 e1 63 7b 2f ac b0 09 |0E.!......c{/...|
00000010 67 74 3c 03 bb 4e c4 72 86 18 9e f4 54 37 61 1a |gt<..N.r....T7a.|
00000020 03 3a fc 05 61 02 20 79 3e 36 e6 20 29 b3 bd 6d |.:..a. y>6. )..m|
00000030 1a be 64 9f 4c 06 5c 68 67 5a 29 0b 9d 03 08 39 |..d.L.\hgZ)....9|
00000040 42 27 c0 8c ac f6 55 |B'....U|
[7f44 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7f45 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[7f46 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88
[7f47 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88
[7f48 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[7f49 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f4a 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f4b 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f4c 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[7f4d 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f4e 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f4f 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[7f50 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[7f51 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[7f52 01-03 17:57:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f53 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13070853717957034353 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7f54 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:13070853717957034353 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7f55 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13070853717957034353 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7f56 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f57 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f58 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f59 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f5a 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f5b 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f5c 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[7f5d 01-03 17:57:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f5e 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:4468126383547074074 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7f5f 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:4468126383547074074 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7f60 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4468126383547074074 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7f61 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f62 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f63 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f64 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f65 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f66 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f67 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[7f68 01-03 17:57:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f69 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7f6a 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7f6b 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7f6c 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[7f6d 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f6e 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f6f 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7f70 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7f71 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7f72 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7f73 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7f74 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7f75 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 38 d5 0b d9 d7 64 89 9d 8d c2 2b ed 24 bf 07 |.8....d....+.$..|
00000010 c2 ec e8 f7 9c ff 50 e9 a9 ce d7 7d 4c f6 64 c2 |......P....}L.d.|
[7f76 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 e9 15 5e dc d1 a3 8a 48 fe cd a7 |0D. B..^....H...|
00000010 c8 33 1a eb aa 46 55 2c 2f 69 e3 b1 c1 41 3d db |.3...FU,/i...A=.|
00000020 7b 40 50 df 02 20 7b 67 49 43 ff 8a ea 3f 6e 07 |{@P.. {gIC...?n.|
00000030 93 4e a1 ae 05 8d a9 f3 22 07 8e f1 24 39 51 ff |.N......"...$9Q.|
00000040 8b 29 91 da f0 00 |.)....|
[7f77 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f78 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a0860 gate 1578074241158797500 evaluation starts
[7f79 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a0860 signed by 0 principal evaluation starts (used [false])
[7f7a 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a0860 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7f7b 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a0860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7f7c 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a0860 principal evaluation fails
[7f7d 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a0860 gate 1578074241158797500 evaluation fails
[7f7e 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7f7f 01-03 17:57:21.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7f80 01-03 17:57:21.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7f81 01-03 17:57:21.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 38 d5 0b d9 d7 64 89 9d 8d c2 2b ed 24 bf 07 |.8....d....+.$..|
00000010 c2 ec e8 f7 9c ff 50 e9 a9 ce d7 7d 4c f6 64 c2 |......P....}L.d.|
[7f82 01-03 17:57:21.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 e9 15 5e dc d1 a3 8a 48 fe cd a7 |0D. B..^....H...|
00000010 c8 33 1a eb aa 46 55 2c 2f 69 e3 b1 c1 41 3d db |.3...FU,/i...A=.|
00000020 7b 40 50 df 02 20 7b 67 49 43 ff 8a ea 3f 6e 07 |{@P.. {gIC...?n.|
00000030 93 4e a1 ae 05 8d a9 f3 22 07 8e f1 24 39 51 ff |.N......"...$9Q.|
00000040 8b 29 91 da f0 00 |.)....|
[7f83 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f84 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1160 gate 1578074241180156200 evaluation starts
[7f85 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1160 signed by 0 principal evaluation starts (used [false])
[7f86 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1160 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[7f87 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1160 principal evaluation succeeds for identity 0
[7f88 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1160 gate 1578074241180156200 evaluation succeeds
[7f89 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7f8a 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7f8b 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7f8c 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7f8d 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[7f8e 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes]}
[7f8f 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88
[7f90 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88
[7f91 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7f92 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f93 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f94 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f95 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[7f96 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f97 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f98 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f99 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[7f9a 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7f9b 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7f9c 01-03 17:57:21.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f9d 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7f9e 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7f9f 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fa0 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7fa1 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[7fa2 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fa3 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7fa4 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7fa5 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7fa6 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7fa7 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7fa8 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7fa9 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 39 03 20 d2 e5 8e 7a 83 39 10 69 44 5c 8b 42 |.9. ...z.9.iD\.B|
00000010 35 45 1f 4a ec 45 01 55 15 a6 7c 2f fd 29 4c bb |5E.J.E.U..|/.)L.|
[7faa 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 df 31 05 35 56 e7 07 9b 01 79 81 |0D. S.1.5V....y.|
00000010 4a 49 8a 6c 9f c1 c8 d1 2c 73 7e 86 65 88 83 d6 |JI.l....,s~.e...|
00000020 ed f9 bd 55 02 20 56 4d 2b 8f 1c de a7 f3 36 22 |...U. VM+.....6"|
00000030 d4 69 e5 26 2e 43 d2 d9 06 d0 ea 95 c8 06 cf 21 |.i.&.C.........!|
00000040 b8 25 9a 01 bb 24 |.%...$|
[7fab 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7fac 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4080 gate 1578074241205247700 evaluation starts
[7fad 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4080 signed by 0 principal evaluation starts (used [false])
[7fae 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4080 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7faf 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7fb0 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4080 principal evaluation fails
[7fb1 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4080 gate 1578074241205247700 evaluation fails
[7fb2 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7fb3 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7fb4 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7fb5 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 39 03 20 d2 e5 8e 7a 83 39 10 69 44 5c 8b 42 |.9. ...z.9.iD\.B|
00000010 35 45 1f 4a ec 45 01 55 15 a6 7c 2f fd 29 4c bb |5E.J.E.U..|/.)L.|
[7fb6 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 df 31 05 35 56 e7 07 9b 01 79 81 |0D. S.1.5V....y.|
00000010 4a 49 8a 6c 9f c1 c8 d1 2c 73 7e 86 65 88 83 d6 |JI.l....,s~.e...|
00000020 ed f9 bd 55 02 20 56 4d 2b 8f 1c de a7 f3 36 22 |...U. VM+.....6"|
00000030 d4 69 e5 26 2e 43 d2 d9 06 d0 ea 95 c8 06 cf 21 |.i.&.C.........!|
00000040 b8 25 9a 01 bb 24 |.%...$|
[7fb7 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7fb8 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4980 gate 1578074241206104200 evaluation starts
[7fb9 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4980 signed by 0 principal evaluation starts (used [false])
[7fba 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4980 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[7fbb 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4980 principal evaluation succeeds for identity 0
[7fbc 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4980 gate 1578074241206104200 evaluation succeeds
[7fbd 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7fbe 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7fbf 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7fc0 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7fc1 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[7fc2 01-03 17:57:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes]}
[7fc3 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86
[7fc4 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86
[7fc5 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[7fc6 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fc7 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fc8 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fc9 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[7fca 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fcb 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fcc 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fcd 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[7fce 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7fcf 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7fd0 01-03 17:57:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fd1 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[7fd2 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:18214974892120126130 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[7fd3 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[7fd4 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15269949419023607515 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[7fd5 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[7fd6 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10859163340057196851 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[7fd7 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10859163340057196851 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7fd8 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fd9 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:18214974892120126130 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7fda 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fdb 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15269949419023607515 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7fdc 01-03 17:57:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fdd 01-03 17:57:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15269949419023607515 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[7fde 01-03 17:57:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15269949419023607515 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes
[7fdf 01-03 17:57:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fe0 01-03 17:57:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18214974892120126130 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7fe1 01-03 17:57:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18214974892120126130 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7fe2 01-03 17:57:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18214974892120126130 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7fe3 01-03 17:57:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fe4 01-03 17:57:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10859163340057196851 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7fe5 01-03 17:57:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10859163340057196851 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7fe6 01-03 17:57:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10859163340057196851 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[7fe7 01-03 17:57:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fe8 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fe9 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fea 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[7feb 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[7fec 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fed 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[7fee 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fef 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[7ff0 01-03 17:57:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ff1 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[7ff2 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[7ff3 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ff4 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ff5 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ff6 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7ff7 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7ff8 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7ff9 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7ffa 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ffb 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ffc 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[7ffd 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[7ffe 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7fff 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619aa0 gate 1578074241343639200 evaluation starts
[8000 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619aa0 signed by 0 principal evaluation starts (used [false])
[8001 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619aa0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8002 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8003 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619aa0 principal evaluation fails
[8004 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619aa0 gate 1578074241343639200 evaluation fails
[8005 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8006 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8007 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[8008 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8009 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[800a 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[800b 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[800c 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463a3a0 gate 1578074241345250500 evaluation starts
[800d 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463a3a0 signed by 0 principal evaluation starts (used [false])
[800e 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463a3a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[800f 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463a3a0 principal evaluation succeeds for identity 0
[8010 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463a3a0 gate 1578074241345250500 evaluation succeeds
[8011 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8012 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8013 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8014 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8015 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[8016 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[8017 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[8018 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[8019 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[801a 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[801b 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[801c 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[801d 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[801e 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[801f 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8020 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8021 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8022 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8023 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8024 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004662b60 gate 1578074241348410600 evaluation starts
[8025 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004662b60 signed by 0 principal evaluation starts (used [false])
[8026 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004662b60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8027 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004662b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8028 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004662b60 principal evaluation fails
[8029 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004662b60 gate 1578074241348410600 evaluation fails
[802a 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[802b 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[802c 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[802d 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[802e 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[802f 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8030 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663460 gate 1578074241348945300 evaluation starts
[8031 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663460 signed by 0 principal evaluation starts (used [false])
[8032 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663460 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8033 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663460 principal evaluation succeeds for identity 0
[8034 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663460 gate 1578074241348945300 evaluation succeeds
[8035 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8036 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8037 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8038 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8039 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[803a 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[803b 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[803c 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[803d 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[803e 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[803f 01-03 17:57:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8040 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8041 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8042 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8043 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8044 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8045 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8046 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8047 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8048 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8049 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[804a 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467de00 gate 1578074241350636500 evaluation starts
[804b 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467de00 signed by 0 principal evaluation starts (used [false])
[804c 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467de00 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[804d 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467de00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[804e 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467de00 principal evaluation fails
[804f 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467de00 gate 1578074241350636500 evaluation fails
[8050 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8051 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8052 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8053 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8054 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8055 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8056 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469c700 gate 1578074241351212200 evaluation starts
[8057 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469c700 signed by 0 principal evaluation starts (used [false])
[8058 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469c700 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8059 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469c700 principal evaluation succeeds for identity 0
[805a 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469c700 gate 1578074241351212200 evaluation succeeds
[805b 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[805c 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[805d 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[805e 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[805f 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8060 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8061 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8062 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8063 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8064 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8065 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8066 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8067 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8068 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8069 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[806a 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2160 gate 1578074241352242200 evaluation starts
[806b 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2160 signed by 0 principal evaluation starts (used [false])
[806c 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2160 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[806d 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[806e 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2160 principal evaluation fails
[806f 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2160 gate 1578074241352242200 evaluation fails
[8070 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8071 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8072 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8073 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8074 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8075 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8076 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2a60 gate 1578074241353047400 evaluation starts
[8077 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2a60 signed by 0 principal evaluation starts (used [false])
[8078 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2a60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8079 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2a60 principal evaluation succeeds for identity 0
[807a 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2a60 gate 1578074241353047400 evaluation succeeds
[807b 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[807c 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[807d 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[807e 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[807f 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8080 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[8081 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8082 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8083 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8084 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8085 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8086 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8087 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8088 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8089 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[808a 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[808b 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[808c 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[808d 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca770 gate 1578074241358953000 evaluation starts
[808e 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca770 signed by 0 principal evaluation starts (used [false])
[808f 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca770 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8090 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8091 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca770 principal evaluation fails
[8092 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca770 gate 1578074241358953000 evaluation fails
[8093 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8094 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8095 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8096 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8097 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8098 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8099 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb070 gate 1578074241359501600 evaluation starts
[809a 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb070 signed by 0 principal evaluation starts (used [false])
[809b 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb070 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[809c 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb070 principal evaluation succeeds for identity 0
[809d 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb070 gate 1578074241359501600 evaluation succeeds
[809e 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[809f 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[80a0 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[80a1 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[80a2 01-03 17:57:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[80a3 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[80a4 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[80a5 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[80a6 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[80a7 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[80a8 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[80a9 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[80aa 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[80ab 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[80ac 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[80ad 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[80ae 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[80af 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[80b0 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[80b1 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df830 gate 1578074241361080400 evaluation starts
[80b2 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df830 signed by 0 principal evaluation starts (used [false])
[80b3 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df830 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[80b4 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[80b5 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df830 principal evaluation fails
[80b6 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df830 gate 1578074241361080400 evaluation fails
[80b7 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[80b8 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[80b9 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[80ba 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[80bb 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[80bc 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[80bd 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702130 gate 1578074241361916800 evaluation starts
[80be 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702130 signed by 0 principal evaluation starts (used [false])
[80bf 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702130 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[80c0 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702130 principal evaluation succeeds for identity 0
[80c1 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702130 gate 1578074241361916800 evaluation succeeds
[80c2 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[80c3 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[80c4 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[80c5 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[80c6 01-03 17:57:21.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80c7 01-03 17:57:21.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151055
[80c8 01-03 17:57:21.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 51B8AF8DF5D067EBDA945AB8A4954A56279231B53511D7CCD5293BAAD2209ECF
[80c9 01-03 17:57:21.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[80ca 01-03 17:57:21.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[80cb 01-03 17:57:21.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[80cc 01-03 17:57:21.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[80cd 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[80ce 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[80cf 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[80d0 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80d1 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[80d2 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[80d3 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80d4 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[80d5 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80d6 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[80d7 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[80d8 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80d9 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[80da 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[80db 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[80dc 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[80dd 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[80de 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[80df 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[80e0 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[80e1 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[80e2 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 39 03 20 d2 e5 8e 7a 83 39 10 69 44 5c 8b 42 |.9. ...z.9.iD\.B|
00000010 35 45 1f 4a ec 45 01 55 15 a6 7c 2f fd 29 4c bb |5E.J.E.U..|/.)L.|
[80e3 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 df 31 05 35 56 e7 07 9b 01 79 81 |0D. S.1.5V....y.|
00000010 4a 49 8a 6c 9f c1 c8 d1 2c 73 7e 86 65 88 83 d6 |JI.l....,s~.e...|
00000020 ed f9 bd 55 02 20 56 4d 2b 8f 1c de a7 f3 36 22 |...U. VM+.....6"|
00000030 d4 69 e5 26 2e 43 d2 d9 06 d0 ea 95 c8 06 cf 21 |.i.&.C.........!|
00000040 b8 25 9a 01 bb 24 |.%...$|
[80e4 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[80e5 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[80e6 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472c2e0 gate 1578074241409780800 evaluation starts
[80e7 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472c2e0 signed by 0 principal evaluation starts (used [false])
[80e8 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472c2e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[80e9 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472c2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[80ea 01-03 17:57:21.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472c2e0 principal evaluation fails
[80ec 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472c2e0 gate 1578074241409780800 evaluation fails
[80ed 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[80eb 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[80ee 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[80ef 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[80f0 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 39 03 20 d2 e5 8e 7a 83 39 10 69 44 5c 8b 42 |.9. ...z.9.iD\.B|
00000010 35 45 1f 4a ec 45 01 55 15 a6 7c 2f fd 29 4c bb |5E.J.E.U..|/.)L.|
[80f1 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 df 31 05 35 56 e7 07 9b 01 79 81 |0D. S.1.5V....y.|
00000010 4a 49 8a 6c 9f c1 c8 d1 2c 73 7e 86 65 88 83 d6 |JI.l....,s~.e...|
00000020 ed f9 bd 55 02 20 56 4d 2b 8f 1c de a7 f3 36 22 |...U. VM+.....6"|
00000030 d4 69 e5 26 2e 43 d2 d9 06 d0 ea 95 c8 06 cf 21 |.i.&.C.........!|
00000040 b8 25 9a 01 bb 24 |.%...$|
[80f2 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[80f3 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472cbe0 gate 1578074241423105000 evaluation starts
[80f4 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472cbe0 signed by 0 principal evaluation starts (used [false])
[80f5 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472cbe0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[80f6 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472cbe0 principal evaluation succeeds for identity 0
[80f7 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472cbe0 gate 1578074241423105000 evaluation succeeds
[80f8 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[80f9 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[80fa 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[80fb 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[80fc 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[80fd 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80fe 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[80ff 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 b8 af 8d f5 d0 67 eb da 94 5a b8 a4 95 4a 56 |Q.....g...Z...JV|
00000010 27 92 31 b5 35 11 d7 cc d5 29 3b aa d2 20 9e cf |'.1.5....);.. ..|
[8100 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 93 8a e7 e6 26 d4 20 b8 13 a3 |0E.!......&. ...|
00000010 a1 3d 97 e9 36 28 f3 4a 4b d6 af 4e 8f 17 18 90 |.=..6(.JK..N....|
00000020 0d b5 87 23 65 02 20 6d a6 95 8d d0 40 fd d2 de |...#e. m....@...|
00000030 d8 9f 19 79 21 40 46 57 e9 91 09 ee 41 78 08 e0 |...y!@FW....Ax..|
00000040 b9 84 eb fc 78 78 a0 |....xx.|
[8101 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[8102 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[8103 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8104 01-03 17:57:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8105 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 08 2b aa f0 d2 b6 7d c9 21 15 54 fb 1a fd f4 |..+....}.!.T....|
00000010 be 5d 47 d0 61 a8 8b 91 7b c7 ed 96 51 a0 ad df |.]G.a...{...Q...|
[8106 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce bd 05 5b 45 38 5a ee 66 38 a4 |0E.!....[E8Z.f8.|
00000010 5f 25 78 8a 23 d7 29 01 e2 54 d4 3f 68 74 2a ee |_%x.#.)..T.?ht*.|
00000020 a2 0a 0b bb ac 02 20 6a b9 70 2c e5 04 39 0c 60 |...... j.p,..9.`|
00000030 5f e2 47 e2 84 ca 13 28 19 67 ed f0 2f 04 9a b5 |_.G....(.g../...|
00000040 05 84 4a 86 9a 79 0c |..J..y.|
[8107 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes
[8108 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8109 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[810a 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[810b 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[810c 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[810d 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[810e 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 b8 af 8d f5 d0 67 eb da 94 5a b8 a4 95 4a 56 |Q.....g...Z...JV|
00000010 27 92 31 b5 35 11 d7 cc d5 29 3b aa d2 20 9e cf |'.1.5....);.. ..|
[810f 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 93 8a e7 e6 26 d4 20 b8 13 a3 |0E.!......&. ...|
00000010 a1 3d 97 e9 36 28 f3 4a 4b d6 af 4e 8f 17 18 90 |.=..6(.JK..N....|
00000020 0d b5 87 23 65 02 20 6d a6 95 8d d0 40 fd d2 de |...#e. m....@...|
00000030 d8 9f 19 79 21 40 46 57 e9 91 09 ee 41 78 08 e0 |...y!@FW....Ax..|
00000040 b9 84 eb fc 78 78 a0 |....xx.|
[8110 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[8111 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 0f 66 bb ae 5e 5b de b5 72 1e |0E.!...f..^[..r.|
00000010 2f b8 51 a2 f0 ae ce 6f ba cb d5 e1 db 3d 3b 9b |/.Q....o.....=;.|
00000020 37 86 ab a9 3a 02 20 40 9d 69 5f cb 53 5d 8d 23 |7...:. @.i_.S].#|
00000030 b5 fe 46 db 1a 42 49 84 98 1b 5b d6 b1 90 a5 13 |..F..BI...[.....|
00000040 e3 21 5d 7f 3f 1c 97 |.!].?..|
[8112 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8113 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8114 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8115 01-03 17:57:21.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8116 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[8117 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8118 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[8119 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[811a 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[811b 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[811c 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[811d 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[811e 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[811f 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8120 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 38 d5 0b d9 d7 64 89 9d 8d c2 2b ed 24 bf 07 |.8....d....+.$..|
00000010 c2 ec e8 f7 9c ff 50 e9 a9 ce d7 7d 4c f6 64 c2 |......P....}L.d.|
[8121 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 e9 15 5e dc d1 a3 8a 48 fe cd a7 |0D. B..^....H...|
00000010 c8 33 1a eb aa 46 55 2c 2f 69 e3 b1 c1 41 3d db |.3...FU,/i...A=.|
00000020 7b 40 50 df 02 20 7b 67 49 43 ff 8a ea 3f 6e 07 |{@P.. {gIC...?n.|
00000030 93 4e a1 ae 05 8d a9 f3 22 07 8e f1 24 39 51 ff |.N......"...$9Q.|
00000040 8b 29 91 da f0 00 |.)....|
[8122 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[8123 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[8124 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510201801
[8125 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E13761FCBBBA061BF0F49152E464CDCC3544E968D7ACAA5B85AB8B53613E0A2A
[8126 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[8127 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8128 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769190 gate 1578074241444332600 evaluation starts
[8129 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769190 signed by 0 principal evaluation starts (used [false])
[812a 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769190 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[812b 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[812c 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769190 principal evaluation fails
[812d 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769190 gate 1578074241444332600 evaluation fails
[812e 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[812f 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8130 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8131 01-03 17:57:21.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 38 d5 0b d9 d7 64 89 9d 8d c2 2b ed 24 bf 07 |.8....d....+.$..|
00000010 c2 ec e8 f7 9c ff 50 e9 a9 ce d7 7d 4c f6 64 c2 |......P....}L.d.|
[8132 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 e9 15 5e dc d1 a3 8a 48 fe cd a7 |0D. B..^....H...|
00000010 c8 33 1a eb aa 46 55 2c 2f 69 e3 b1 c1 41 3d db |.3...FU,/i...A=.|
00000020 7b 40 50 df 02 20 7b 67 49 43 ff 8a ea 3f 6e 07 |{@P.. {gIC...?n.|
00000030 93 4e a1 ae 05 8d a9 f3 22 07 8e f1 24 39 51 ff |.N......"...$9Q.|
00000040 8b 29 91 da f0 00 |.)....|
[8133 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8134 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8135 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8136 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8137 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:32 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[8138 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8139 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[813a 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:32 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[813b 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[813c 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[813d 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769a90 gate 1578074241451423200 evaluation starts
[813e 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769a90 signed by 0 principal evaluation starts (used [false])
[813f 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769a90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8140 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769a90 principal evaluation succeeds for identity 0
[8141 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004769a90 gate 1578074241451423200 evaluation succeeds
[8142 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8143 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8144 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8145 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8146 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[8147 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8148 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8149 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 08 2b aa f0 d2 b6 7d c9 21 15 54 fb 1a fd f4 |..+....}.!.T....|
00000010 be 5d 47 d0 61 a8 8b 91 7b c7 ed 96 51 a0 ad df |.]G.a...{...Q...|
[814a 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce bd 05 5b 45 38 5a ee 66 38 a4 |0E.!....[E8Z.f8.|
00000010 5f 25 78 8a 23 d7 29 01 e2 54 d4 3f 68 74 2a ee |_%x.#.)..T.?ht*.|
00000020 a2 0a 0b bb ac 02 20 6a b9 70 2c e5 04 39 0c 60 |...... j.p,..9.`|
00000030 5f e2 47 e2 84 ca 13 28 19 67 ed f0 2f 04 9a b5 |_.G....(.g../...|
00000040 05 84 4a 86 9a 79 0c |..J..y.|
[814b 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes
[814c 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[814d 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[814e 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 b8 af 8d f5 d0 67 eb da 94 5a b8 a4 95 4a 56 |Q.....g...Z...JV|
00000010 27 92 31 b5 35 11 d7 cc d5 29 3b aa d2 20 9e cf |'.1.5....);.. ..|
[814f 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 93 8a e7 e6 26 d4 20 b8 13 a3 |0E.!......&. ...|
00000010 a1 3d 97 e9 36 28 f3 4a 4b d6 af 4e 8f 17 18 90 |.=..6(.JK..N....|
00000020 0d b5 87 23 65 02 20 6d a6 95 8d d0 40 fd d2 de |...#e. m....@...|
00000030 d8 9f 19 79 21 40 46 57 e9 91 09 ee 41 78 08 e0 |...y!@FW....Ax..|
00000040 b9 84 eb fc 78 78 a0 |....xx.|
[8150 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[8151 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[8152 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8153 01-03 17:57:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8154 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8155 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8156 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[8157 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8158 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8159 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11441685735101011424 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[815a 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11441685735101011424 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[815b 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[815c 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11441685735101011424 , Msg_type: BLOCK_MSG, digests: [1 3 4 5 6 7 8 2], Envelope: 58 bytes, Signature: 0 bytes
[815d 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11441685735101011424 , Msg_type: BLOCK_MSG, digests: [1 3 4 5 6 7 8 2], Envelope: 58 bytes, Signature: 0 bytes
[815e 01-03 17:57:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[815f 01-03 17:57:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[8160 01-03 17:57:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8161 01-03 17:57:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8162 01-03 17:57:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8163 01-03 17:57:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8164 01-03 17:57:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8165 01-03 17:57:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8166 01-03 17:57:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8167 01-03 17:57:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 67 d3 85 77 5f 51 f3 e1 c3 12 88 e4 83 39 00 |.g..w_Q.......9.|
00000010 51 af 36 ce fe e4 b3 9c fe cf cc cc 7b c6 2b c1 |Q.6.........{.+.|
[8168 01-03 17:57:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 72 f9 b9 fc 85 57 e4 f8 e8 94 |0E.!..r....W....|
00000010 b5 48 12 ef cf 39 ba 07 ba 74 77 9f 00 de 0b 42 |.H...9...tw....B|
00000020 95 b9 dc e8 85 02 20 1d ac ec be ba 14 d1 50 3d |...... .......P=|
00000030 d4 99 2e 99 46 9d f3 ce bd c3 91 77 cf 4d ea 4a |....F......w.M.J|
00000040 27 53 5c 3a d7 9c f1 |'S\:...|
[8169 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[816a 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 0e 44 fd 6a a1 24 e5 84 81 dc |0E.!...D.j.$....|
00000010 30 df 9d 8f a4 82 06 58 30 4c be 5a b6 53 0b 2d |0......X0L.Z.S.-|
00000020 44 f6 6a 82 b6 02 20 5d 99 ec 01 fa 78 65 ca e9 |D.j... ]....xe..|
00000030 83 27 37 81 c7 89 1b 84 42 f3 d6 c5 c8 34 1b 47 |.'7.....B....4.G|
00000040 3c b5 81 f4 f8 10 ac |<......|
[816b 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[816c 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[816d 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89
[816e 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89
[8170 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[816f 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[8171 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8172 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8173 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8174 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[8175 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8176 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[8177 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8178 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8179 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[817a 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[817b 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[817c 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[817d 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[817e 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[817f 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8180 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[8181 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8182 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[8183 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[8184 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8185 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[8186 01-03 17:57:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8187 01-03 17:57:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:407225007655994588 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8188 01-03 17:57:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:407225007655994588 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8189 01-03 17:57:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 7 8 1 2] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[818a 01-03 17:57:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[818b 01-03 17:57:22.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[818c 01-03 17:57:22.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[818d 01-03 17:57:22.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[818e 01-03 17:57:22.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[818f 01-03 17:57:22.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8190 01-03 17:57:22.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8191 01-03 17:57:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[8192 01-03 17:57:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[8193 01-03 17:57:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8194 01-03 17:57:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8195 01-03 17:57:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8196 01-03 17:57:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8197 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[8198 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[8199 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[819a 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[819b 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[819c 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[819d 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[819e 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[819f 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[81a0 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[81a1 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[81a2 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[81a3 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 3f a8 3c c0 6d fe fc 01 7a 55 13 25 6c f1 c2 |.?.<.m...zU.%l..|
00000010 cd 37 f1 2b de b3 37 c9 25 0c b8 95 a8 a5 49 8c |.7.+..7.%.....I.|
[81a4 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 1e 88 b2 1a b8 b1 ee 4e 36 44 8b |0D. 0.......N6D.|
00000010 56 a6 a5 db be cc 45 4c 3e ee 2f 02 c0 a8 7c 5f |V.....EL>./...|_|
00000020 86 78 30 31 02 20 12 64 e4 87 d5 9f bb ac b2 53 |.x01. .d.......S|
00000030 a6 33 bd cc 12 5c 44 86 11 dc 14 12 d3 60 f9 63 |.3...\D......`.c|
00000040 96 f9 a5 f0 44 43 |....DC|
[81a5 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81a6 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004826ff0 gate 1578074242975074400 evaluation starts
[81a7 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004826ff0 signed by 0 principal evaluation starts (used [false])
[81a8 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004826ff0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[81a9 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004826ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[81aa 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004826ff0 principal evaluation fails
[81ab 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004826ff0 gate 1578074242975074400 evaluation fails
[81ac 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[81ad 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[81ae 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[81af 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 3f a8 3c c0 6d fe fc 01 7a 55 13 25 6c f1 c2 |.?.<.m...zU.%l..|
00000010 cd 37 f1 2b de b3 37 c9 25 0c b8 95 a8 a5 49 8c |.7.+..7.%.....I.|
[81b0 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 1e 88 b2 1a b8 b1 ee 4e 36 44 8b |0D. 0.......N6D.|
00000010 56 a6 a5 db be cc 45 4c 3e ee 2f 02 c0 a8 7c 5f |V.....EL>./...|_|
00000020 86 78 30 31 02 20 12 64 e4 87 d5 9f bb ac b2 53 |.x01. .d.......S|
00000030 a6 33 bd cc 12 5c 44 86 11 dc 14 12 d3 60 f9 63 |.3...\D......`.c|
00000040 96 f9 a5 f0 44 43 |....DC|
[81b1 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81b2 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048278f0 gate 1578074242975564700 evaluation starts
[81b3 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048278f0 signed by 0 principal evaluation starts (used [false])
[81b4 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048278f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[81b5 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048278f0 principal evaluation succeeds for identity 0
[81b6 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048278f0 gate 1578074242975564700 evaluation succeeds
[81b7 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[81b8 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[81b9 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[81ba 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[81bb 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[81bc 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes]}
[81bd 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87
[81be 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87
[81bf 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[81c0 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81c1 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81c2 01-03 17:57:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81c3 01-03 17:57:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81c4 01-03 17:57:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81c5 01-03 17:57:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[81c6 01-03 17:57:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81c7 01-03 17:57:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[81c8 01-03 17:57:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81c9 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81ca 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81cb 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81cc 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81cd 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[81ce 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81cf 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81d0 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[81d1 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[81d2 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81d3 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[81d4 01-03 17:57:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81d5 01-03 17:57:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[81d6 01-03 17:57:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[81d7 01-03 17:57:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81d8 01-03 17:57:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[81d9 01-03 17:57:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81da 01-03 17:57:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[81db 01-03 17:57:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[81dc 01-03 17:57:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81dd 01-03 17:57:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[81de 01-03 17:57:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[81df 01-03 17:57:23.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81e0 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[81e1 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[81e2 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[81e3 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[81e4 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[81e5 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[81e6 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 01 cb 09 bf 41 14 92 5e 49 0a b3 44 64 96 6e |1....A..^I..Dd.n|
00000010 21 39 9a e7 41 09 f0 96 ce fc 3a a5 f0 cb 28 99 |!9..A.....:...(.|
[81e7 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a af 48 38 56 cb df 19 26 6d 62 8b |0D. *.H8V...&mb.|
00000010 a9 13 48 c6 1e 93 f6 78 9c d4 ac 6c 4f 29 23 a8 |..H....x...lO)#.|
00000020 b7 b8 a4 20 02 20 30 8d 45 be 7d 75 37 45 8a d3 |... . 0.E.}u7E..|
00000030 eb 33 5e 0f 5c 80 70 c8 f6 3b 6b 26 4d 72 bf 0e |.3^.\.p..;k&Mr..|
00000040 fe 87 f1 ed ae b7 |......|
[81e8 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81e9 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486cd20 gate 1578074243102134300 evaluation starts
[81ea 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486cd20 signed by 0 principal evaluation starts (used [false])
[81eb 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486cd20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[81ec 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486cd20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[81ed 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486cd20 principal evaluation fails
[81ee 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486cd20 gate 1578074243102134300 evaluation fails
[81ef 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[81f0 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[81f1 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[81f2 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 01 cb 09 bf 41 14 92 5e 49 0a b3 44 64 96 6e |1....A..^I..Dd.n|
00000010 21 39 9a e7 41 09 f0 96 ce fc 3a a5 f0 cb 28 99 |!9..A.....:...(.|
[81f3 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a af 48 38 56 cb df 19 26 6d 62 8b |0D. *.H8V...&mb.|
00000010 a9 13 48 c6 1e 93 f6 78 9c d4 ac 6c 4f 29 23 a8 |..H....x...lO)#.|
00000020 b7 b8 a4 20 02 20 30 8d 45 be 7d 75 37 45 8a d3 |... . 0.E.}u7E..|
00000030 eb 33 5e 0f 5c 80 70 c8 f6 3b 6b 26 4d 72 bf 0e |.3^.\.p..;k&Mr..|
00000040 fe 87 f1 ed ae b7 |......|
[81f4 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81f5 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d620 gate 1578074243108774900 evaluation starts
[81f6 01-03 17:57:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d620 signed by 0 principal evaluation starts (used [false])
[81f7 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d620 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[81f8 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d620 principal evaluation succeeds for identity 0
[81f9 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d620 gate 1578074243108774900 evaluation succeeds
[81fa 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[81fb 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[81fc 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[81fd 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[81fe 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[81ff 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes]}
[8200 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89
[8201 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89
[8202 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8203 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8204 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8205 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8206 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8207 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8208 01-03 17:57:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8209 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[820a 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[820b 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[820c 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[820d 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[820f 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8210 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[820e 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8211 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8212 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8213 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8214 01-03 17:57:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8215 01-03 17:57:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8216 01-03 17:57:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8217 01-03 17:57:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8218 01-03 17:57:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8219 01-03 17:57:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[821a 01-03 17:57:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[821b 01-03 17:57:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[821c 01-03 17:57:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[821d 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151056
[821e 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 689CF9039072DE7B59BDEF04E42C5345441B38F29C6C26987A2EF3608DE47BD2
[821f 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8220 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8221 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[8222 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8223 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8224 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8225 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8226 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8227 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8228 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[8229 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[822b 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[822c 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[822d 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[822a 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[822e 01-03 17:57:23.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[822f 01-03 17:57:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[8230 01-03 17:57:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[8231 01-03 17:57:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8232 01-03 17:57:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[8233 01-03 17:57:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[8234 01-03 17:57:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 9c f9 03 90 72 de 7b 59 bd ef 04 e4 2c 53 45 |h....r.{Y....,SE|
00000010 44 1b 38 f2 9c 6c 26 98 7a 2e f3 60 8d e4 7b d2 |D.8..l&.z..`..{.|
[8235 01-03 17:57:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c ab 88 05 20 c2 5a 5c 9f 6a 1e ca |0D. ,... .Z\.j..|
00000010 d4 fd fb ea 64 b3 3e ff 05 12 e7 53 78 22 fa dc |....d.>....Sx"..|
00000020 a6 b6 56 c1 02 20 0b 90 56 f8 41 3a 18 ea ed d4 |..V.. ..V.A:....|
00000030 37 f0 b5 51 4e 7f 5d 7a b9 0f 97 5a 5d f1 31 38 |7..QN.]z...Z].18|
00000040 f6 4f 87 a7 e1 3a |.O...:|
[8236 01-03 17:57:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[8237 01-03 17:57:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8238 01-03 17:57:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:10479018765240735461 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8239 01-03 17:57:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10479018765240735461 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[823a 01-03 17:57:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[823b 01-03 17:57:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[823c 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[823d 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[823e 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[823f 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8240 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 fa f0 bb da 15 c7 2a 53 e9 31 88 b0 e4 89 20 |.......*S.1.... |
00000010 a5 02 15 0a 1b e2 67 97 36 56 e9 e3 d6 b1 09 ec |......g.6V......|
[8241 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 f4 8d ad 1c 55 ec 54 29 ab 4b |0E.!......U.T).K|
00000010 6d a6 9d 09 2b 9b 05 17 19 85 a2 a3 eb 04 65 1c |m...+.........e.|
00000020 22 f5 4d 45 01 02 20 52 e4 af 8f 1d 4c a8 19 e4 |".ME.. R....L...|
00000030 f4 19 09 ea f2 cd a6 39 fb eb d2 25 14 43 7c 72 |.......9...%.C|r|
00000040 d3 b6 f9 05 6c 2f ac |....l/.|
[8242 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[8243 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 97 ec c3 dd 20 a9 a9 bc ea f2 3c |0D. t.... .....<|
00000010 00 f3 44 33 11 cf 9e a2 08 ce 13 39 3c bc d7 7b |..D3.......9<..{|
00000020 72 87 02 aa 02 20 6e b8 67 8c c0 f7 e9 60 77 7c |r.... n.g....`w||
00000030 1e d6 f3 79 4e 02 56 a5 82 2f af 7d 5c 5c a0 61 |...yN.V../.}\\.a|
00000040 dd 2f 5d ef 01 d6 |./]...|
[8244 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8245 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[8246 01-03 17:57:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90
[8247 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90
[8248 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[8249 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[824a 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[824b 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[824c 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[824d 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[824e 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[824f 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[8250 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[8251 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[8252 01-03 17:57:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8253 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:15424192082816315159 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8254 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:15424192082816315159 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8255 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15424192082816315159 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8256 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8257 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8258 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8259 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[825a 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[825b 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[825c 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[825d 01-03 17:57:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[825e 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:14591186497294673092 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[825f 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14591186497294673092 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8260 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14591186497294673092 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8261 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8262 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8263 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8264 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8265 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8266 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8267 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[8268 01-03 17:57:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8269 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[826a 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[826b 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[826c 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[826d 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[826e 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[826f 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8270 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8271 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8272 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8273 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8274 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8275 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 3a 5f 09 2c 52 c5 fe 90 d3 d6 44 5c c8 ad 59 |.:_.,R.....D\..Y|
00000010 ae b2 f5 9d 02 5b 2d ae 11 f8 b3 f2 15 ce 90 d4 |.....[-.........|
[8276 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 29 bc a8 ca eb ac d5 06 36 40 e1 |0D. S).......6@.|
00000010 c7 85 97 d3 c8 bf de 31 32 34 45 bc 5f 7b df ab |.......124E._{..|
00000020 8b c1 4a bb 02 20 2d df 8b a8 d3 96 6f 32 c8 cc |..J.. -.....o2..|
00000030 2d bd 4a 06 03 86 bc ff d1 5d a0 11 de 9f a6 2a |-.J......].....*|
00000040 69 aa 61 50 c0 2e |i.aP..|
[8277 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8278 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc820 gate 1578074245157904700 evaluation starts
[8279 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc820 signed by 0 principal evaluation starts (used [false])
[827a 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc820 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[827b 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[827c 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc820 principal evaluation fails
[827d 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc820 gate 1578074245157904700 evaluation fails
[827e 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[827f 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8280 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8281 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 3a 5f 09 2c 52 c5 fe 90 d3 d6 44 5c c8 ad 59 |.:_.,R.....D\..Y|
00000010 ae b2 f5 9d 02 5b 2d ae 11 f8 b3 f2 15 ce 90 d4 |.....[-.........|
[8282 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 29 bc a8 ca eb ac d5 06 36 40 e1 |0D. S).......6@.|
00000010 c7 85 97 d3 c8 bf de 31 32 34 45 bc 5f 7b df ab |.......124E._{..|
00000020 8b c1 4a bb 02 20 2d df 8b a8 d3 96 6f 32 c8 cc |..J.. -.....o2..|
00000030 2d bd 4a 06 03 86 bc ff d1 5d a0 11 de 9f a6 2a |-.J......].....*|
00000040 69 aa 61 50 c0 2e |i.aP..|
[8283 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8284 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd120 gate 1578074245158669700 evaluation starts
[8285 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd120 signed by 0 principal evaluation starts (used [false])
[8286 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd120 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8287 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd120 principal evaluation succeeds for identity 0
[8288 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd120 gate 1578074245158669700 evaluation succeeds
[8289 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[828a 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[828b 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[828c 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[828d 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[828e 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes]}
[828f 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90
[8290 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90
[8291 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8292 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8293 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8294 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8295 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[8296 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8297 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8298 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8299 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[829a 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[829b 01-03 17:57:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[829c 01-03 17:57:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[829d 01-03 17:57:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[829e 01-03 17:57:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[829f 01-03 17:57:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82a0 01-03 17:57:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[82a1 01-03 17:57:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[82a2 01-03 17:57:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82a3 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[82a4 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[82a5 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[82a6 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[82a7 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[82a8 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[82a9 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 9a 7e ac 65 f8 e8 5c d8 07 3b cb 40 15 5b 9a |#.~.e..\..;.@.[.|
00000010 d5 c6 0c b4 fe 16 77 e3 72 ff c1 73 1d 7d b6 e5 |......w.r..s.}..|
[82aa 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e e1 45 92 a3 70 19 3a c7 04 0c 96 |0D. ~.E..p.:....|
00000010 ea 5b c5 e9 16 bd 1a d3 72 3c 5d a5 51 36 65 f0 |.[......r<].Q6e.|
00000020 9e 13 d2 61 02 20 0a 6b cb 18 82 46 a7 61 d7 37 |...a. .k...F.a.7|
00000030 8d 9e 5a 37 40 c9 d7 df 78 16 69 16 88 3b 34 8d |..Z7@...x.i..;4.|
00000040 55 6d 53 b3 32 13 |UmS.2.|
[82ab 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[82ac 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004913920 gate 1578074245222390200 evaluation starts
[82ad 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004913920 signed by 0 principal evaluation starts (used [false])
[82ae 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004913920 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[82af 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004913920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[82b0 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004913920 principal evaluation fails
[82b1 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004913920 gate 1578074245222390200 evaluation fails
[82b2 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[82b3 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[82b4 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[82b5 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 9a 7e ac 65 f8 e8 5c d8 07 3b cb 40 15 5b 9a |#.~.e..\..;.@.[.|
00000010 d5 c6 0c b4 fe 16 77 e3 72 ff c1 73 1d 7d b6 e5 |......w.r..s.}..|
[82b6 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e e1 45 92 a3 70 19 3a c7 04 0c 96 |0D. ~.E..p.:....|
00000010 ea 5b c5 e9 16 bd 1a d3 72 3c 5d a5 51 36 65 f0 |.[......r<].Q6e.|
00000020 9e 13 d2 61 02 20 0a 6b cb 18 82 46 a7 61 d7 37 |...a. .k...F.a.7|
00000030 8d 9e 5a 37 40 c9 d7 df 78 16 69 16 88 3b 34 8d |..Z7@...x.i..;4.|
00000040 55 6d 53 b3 32 13 |UmS.2.|
[82b7 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[82b8 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a220 gate 1578074245225527700 evaluation starts
[82b9 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a220 signed by 0 principal evaluation starts (used [false])
[82ba 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a220 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[82bb 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a220 principal evaluation succeeds for identity 0
[82bc 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a220 gate 1578074245225527700 evaluation succeeds
[82bd 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[82be 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[82bf 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[82c0 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[82c1 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[82c2 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes]}
[82c3 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88
[82c4 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88
[82c5 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[82c6 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82c7 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82c8 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82c9 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[82ca 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82cb 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82cc 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82cd 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[82ce 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[82cf 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[82d0 01-03 17:57:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82d1 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[82d2 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:235112000099031943 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[82d3 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[82d4 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5328929435966268982 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[82d5 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[82d6 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13623408438023914755 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[82d7 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:235112000099031943 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[82d8 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82d9 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13623408438023914755 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[82da 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82db 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5328929435966268982 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[82dc 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82dd 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 235112000099031943 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[82de 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 235112000099031943 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[82df 01-03 17:57:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82e0 01-03 17:57:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13623408438023914755 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[82e1 01-03 17:57:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13623408438023914755 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[82e2 01-03 17:57:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13623408438023914755 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[82e3 01-03 17:57:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82e4 01-03 17:57:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5328929435966268982 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[82e5 01-03 17:57:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5328929435966268982 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[82e6 01-03 17:57:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5328929435966268982 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[82e7 01-03 17:57:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82e8 01-03 17:57:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82e9 01-03 17:57:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82ea 01-03 17:57:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[82eb 01-03 17:57:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[82ec 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[82ee 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82ed 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[82ef 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82f0 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[82f1 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[82f2 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82f3 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82f4 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82f5 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[82f6 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[82f7 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[82f8 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[82f9 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[82fa 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[82fb 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[82fc 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[82fd 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[82fe 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961330 gate 1578074245344460700 evaluation starts
[82ff 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961330 signed by 0 principal evaluation starts (used [false])
[8300 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961330 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8301 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8302 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961330 principal evaluation fails
[8303 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961330 gate 1578074245344460700 evaluation fails
[8304 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8305 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8306 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8307 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8308 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8309 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[830a 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961c30 gate 1578074245344884100 evaluation starts
[830b 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961c30 signed by 0 principal evaluation starts (used [false])
[830c 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961c30 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[830d 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961c30 principal evaluation succeeds for identity 0
[830e 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961c30 gate 1578074245344884100 evaluation succeeds
[830f 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8310 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8311 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8312 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8313 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[8314 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[8315 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[8316 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[8317 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8318 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8319 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[831a 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[831b 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[831c 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[831d 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[831e 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[831f 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8320 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8321 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8322 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8323 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8324 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498e3f0 gate 1578074245347230400 evaluation starts
[8325 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498e3f0 signed by 0 principal evaluation starts (used [false])
[8326 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498e3f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8327 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498e3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8328 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498e3f0 principal evaluation fails
[8329 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498e3f0 gate 1578074245347230400 evaluation fails
[832a 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[832b 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[832c 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[832d 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[832e 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[832f 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8330 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498ecf0 gate 1578074245347653300 evaluation starts
[8331 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498ecf0 signed by 0 principal evaluation starts (used [false])
[8332 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498ecf0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8333 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498ecf0 principal evaluation succeeds for identity 0
[8334 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498ecf0 gate 1578074245347653300 evaluation succeeds
[8335 01-03 17:57:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8336 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8337 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8338 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8339 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[833a 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[833b 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[833c 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[833d 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[833e 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[833f 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8340 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8341 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8342 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8343 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8344 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8345 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8346 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8347 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8348 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8349 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[834a 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7690 gate 1578074245354345400 evaluation starts
[834b 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7690 signed by 0 principal evaluation starts (used [false])
[834c 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7690 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[834d 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[834e 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7690 principal evaluation fails
[834f 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7690 gate 1578074245354345400 evaluation fails
[8350 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8351 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8352 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8353 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8354 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8355 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8356 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7f90 gate 1578074245356439900 evaluation starts
[8357 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7f90 signed by 0 principal evaluation starts (used [false])
[8358 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7f90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8359 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7f90 principal evaluation succeeds for identity 0
[835a 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a7f90 gate 1578074245356439900 evaluation succeeds
[835b 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[835c 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[835d 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[835e 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[835f 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8360 01-03 17:57:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8361 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8362 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8363 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8364 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8365 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8366 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8367 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8368 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8369 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[836a 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c19f0 gate 1578074245367895600 evaluation starts
[836b 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c19f0 signed by 0 principal evaluation starts (used [false])
[836c 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c19f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[836d 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c19f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[836e 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c19f0 principal evaluation fails
[836f 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c19f0 gate 1578074245367895600 evaluation fails
[8370 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8371 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8372 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8373 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8374 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8375 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8376 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049d02f0 gate 1578074245368497500 evaluation starts
[8377 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049d02f0 signed by 0 principal evaluation starts (used [false])
[8378 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049d02f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8379 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049d02f0 principal evaluation succeeds for identity 0
[837a 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049d02f0 gate 1578074245368497500 evaluation succeeds
[837b 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[837c 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[837d 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[837e 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[837f 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8380 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[8381 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8382 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8383 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8384 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8385 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8386 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8387 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8388 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8389 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[838a 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[838b 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[838c 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[838d 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8000 gate 1578074245369939200 evaluation starts
[838e 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8000 signed by 0 principal evaluation starts (used [false])
[838f 01-03 17:57:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8000 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8390 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8391 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8000 principal evaluation fails
[8392 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8000 gate 1578074245369939200 evaluation fails
[8393 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8394 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8395 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8396 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8397 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8398 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8399 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8900 gate 1578074245370427900 evaluation starts
[839a 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8900 signed by 0 principal evaluation starts (used [false])
[839b 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8900 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[839c 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8900 principal evaluation succeeds for identity 0
[839d 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e8900 gate 1578074245370427900 evaluation succeeds
[839e 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[839f 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[83a0 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[83a1 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[83a2 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[83a3 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[83a4 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[83a5 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[83a6 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83a7 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83a8 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[83a9 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[83aa 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[83ab 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[83ac 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[83ad 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[83ae 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[83af 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[83b0 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83b1 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a030c0 gate 1578074245371903000 evaluation starts
[83b2 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a030c0 signed by 0 principal evaluation starts (used [false])
[83b3 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a030c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[83b4 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a030c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[83b5 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a030c0 principal evaluation fails
[83b6 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a030c0 gate 1578074245371903000 evaluation fails
[83b7 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[83b8 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[83b9 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[83ba 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[83bb 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[83bc 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83bd 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a039c0 gate 1578074245372387800 evaluation starts
[83be 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a039c0 signed by 0 principal evaluation starts (used [false])
[83bf 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a039c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[83c0 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a039c0 principal evaluation succeeds for identity 0
[83c1 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a039c0 gate 1578074245372387800 evaluation succeeds
[83c2 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[83c3 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[83c4 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[83c5 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[83c6 01-03 17:57:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83c7 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151057
[83c8 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 74169E1F4BE0C55FB9AEB4062C4FED85E34FA3DF0838EBD6B09F7987BF43F7CA
[83c9 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[83ca 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[83cb 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83cc 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[83cd 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[83ce 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83cf 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[83d0 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[83d1 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83d2 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[83d3 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83d4 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[83d5 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83d6 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[83d7 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[83d8 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83d9 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[83da 01-03 17:57:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[83db 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 16 9e 1f 4b e0 c5 5f b9 ae b4 06 2c 4f ed 85 |t...K.._....,O..|
00000010 e3 4f a3 df 08 38 eb d6 b0 9f 79 87 bf 43 f7 ca |.O...8....y..C..|
[83dc 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 9c bc c2 1d f2 e8 ca 43 33 14 |0E.!.........C3.|
00000010 c4 11 24 dc ed e3 d2 cf bd 99 40 dd 3c 7b 6f f7 |..$.......@.<{o.|
00000020 79 ca 43 bf 24 02 20 48 29 43 83 40 5f 4f 30 9b |y.C.$. H)C.@_O0.|
00000030 69 8b 70 0d 46 54 00 f2 e5 d2 b9 fa 2d 5c 12 df |i.p.FT......-\..|
00000040 0f cb 6c d8 4b f2 58 |..l.K.X|
[83dd 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[83de 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[83df 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[83e0 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83e1 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[83e2 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 fa f0 bb da 15 c7 2a 53 e9 31 88 b0 e4 89 20 |.......*S.1.... |
00000010 a5 02 15 0a 1b e2 67 97 36 56 e9 e3 d6 b1 09 ec |......g.6V......|
[83e3 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 f4 8d ad 1c 55 ec 54 29 ab 4b |0E.!......U.T).K|
00000010 6d a6 9d 09 2b 9b 05 17 19 85 a2 a3 eb 04 65 1c |m...+.........e.|
00000020 22 f5 4d 45 01 02 20 52 e4 af 8f 1d 4c a8 19 e4 |".ME.. R....L...|
00000030 f4 19 09 ea f2 cd a6 39 fb eb d2 25 14 43 7c 72 |.......9...%.C|r|
00000040 d3 b6 f9 05 6c 2f ac |....l/.|
[83e4 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[83e5 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83e6 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[83e7 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83e8 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[83e9 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[83ea 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[83eb 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[83ec 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[83ed 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[83ee 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 9a 7e ac 65 f8 e8 5c d8 07 3b cb 40 15 5b 9a |#.~.e..\..;.@.[.|
00000010 d5 c6 0c b4 fe 16 77 e3 72 ff c1 73 1d 7d b6 e5 |......w.r..s.}..|
[83ef 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e e1 45 92 a3 70 19 3a c7 04 0c 96 |0D. ~.E..p.:....|
00000010 ea 5b c5 e9 16 bd 1a d3 72 3c 5d a5 51 36 65 f0 |.[......r<].Q6e.|
00000020 9e 13 d2 61 02 20 0a 6b cb 18 82 46 a7 61 d7 37 |...a. .k...F.a.7|
00000030 8d 9e 5a 37 40 c9 d7 df 78 16 69 16 88 3b 34 8d |..Z7@...x.i..;4.|
00000040 55 6d 53 b3 32 13 |UmS.2.|
[83f0 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83f1 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a48790 gate 1578074245419708000 evaluation starts
[83f2 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a48790 signed by 0 principal evaluation starts (used [false])
[83f3 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a48790 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[83f4 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a48790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[83f5 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a48790 principal evaluation fails
[83f6 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a48790 gate 1578074245419708000 evaluation fails
[83f7 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[83f8 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[83f9 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[83fa 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 9a 7e ac 65 f8 e8 5c d8 07 3b cb 40 15 5b 9a |#.~.e..\..;.@.[.|
00000010 d5 c6 0c b4 fe 16 77 e3 72 ff c1 73 1d 7d b6 e5 |......w.r..s.}..|
[83fb 01-03 17:57:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e e1 45 92 a3 70 19 3a c7 04 0c 96 |0D. ~.E..p.:....|
00000010 ea 5b c5 e9 16 bd 1a d3 72 3c 5d a5 51 36 65 f0 |.[......r<].Q6e.|
00000020 9e 13 d2 61 02 20 0a 6b cb 18 82 46 a7 61 d7 37 |...a. .k...F.a.7|
00000030 8d 9e 5a 37 40 c9 d7 df 78 16 69 16 88 3b 34 8d |..Z7@...x.i..;4.|
00000040 55 6d 53 b3 32 13 |UmS.2.|
[83fc 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83fd 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49090 gate 1578074245420119900 evaluation starts
[83fe 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49090 signed by 0 principal evaluation starts (used [false])
[83ff 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49090 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8400 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49090 principal evaluation succeeds for identity 0
[8401 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49090 gate 1578074245420119900 evaluation succeeds
[8402 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8403 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8404 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8405 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8406 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[8407 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8408 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8409 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[840a 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[840b 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 16 9e 1f 4b e0 c5 5f b9 ae b4 06 2c 4f ed 85 |t...K.._....,O..|
00000010 e3 4f a3 df 08 38 eb d6 b0 9f 79 87 bf 43 f7 ca |.O...8....y..C..|
[840c 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 9c bc c2 1d f2 e8 ca 43 33 14 |0E.!.........C3.|
00000010 c4 11 24 dc ed e3 d2 cf bd 99 40 dd 3c 7b 6f f7 |..$.......@.<{o.|
00000020 79 ca 43 bf 24 02 20 48 29 43 83 40 5f 4f 30 9b |y.C.$. H)C.@_O0.|
00000030 69 8b 70 0d 46 54 00 f2 e5 d2 b9 fa 2d 5c 12 df |i.p.FT......-\..|
00000040 0f cb 6c d8 4b f2 58 |..l.K.X|
[840d 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[840e 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 8c 67 cd 37 bd 77 11 a6 e8 14 1f |0D. t.g.7.w.....|
00000010 16 0d 65 38 e4 17 88 9b f2 d8 2d 05 23 dd 6c ba |..e8......-.#.l.|
00000020 68 b9 3e 3c 02 20 4d 00 75 ad 19 8b ea 7c 47 1a |h.><. M.u....|G.|
00000030 57 f8 24 f7 4c cc aa c8 7d 99 50 1f 33 ee fa 3d |W.$.L...}.P.3..=|
00000040 a0 0e 6f 7d 76 db |..o}v.|
[840f 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8410 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8411 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8412 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8413 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8414 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8415 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8416 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8417 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8418 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[8419 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[841a 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[841b 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[841c 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[841d 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[841e 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[841f 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8420 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 3a 5f 09 2c 52 c5 fe 90 d3 d6 44 5c c8 ad 59 |.:_.,R.....D\..Y|
00000010 ae b2 f5 9d 02 5b 2d ae 11 f8 b3 f2 15 ce 90 d4 |.....[-.........|
[8421 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 29 bc a8 ca eb ac d5 06 36 40 e1 |0D. S).......6@.|
00000010 c7 85 97 d3 c8 bf de 31 32 34 45 bc 5f 7b df ab |.......124E._{..|
00000020 8b c1 4a bb 02 20 2d df 8b a8 d3 96 6f 32 c8 cc |..J.. -.....o2..|
00000030 2d bd 4a 06 03 86 bc ff d1 5d a0 11 de 9f a6 2a |-.J......].....*|
00000040 69 aa 61 50 c0 2e |i.aP..|
[8422 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8423 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a765b0 gate 1578074245427811800 evaluation starts
[8424 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a765b0 signed by 0 principal evaluation starts (used [false])
[8425 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a765b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8426 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a765b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8427 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a765b0 principal evaluation fails
[8428 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a765b0 gate 1578074245427811800 evaluation fails
[8429 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[842a 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[842b 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[842c 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 3a 5f 09 2c 52 c5 fe 90 d3 d6 44 5c c8 ad 59 |.:_.,R.....D\..Y|
00000010 ae b2 f5 9d 02 5b 2d ae 11 f8 b3 f2 15 ce 90 d4 |.....[-.........|
[842d 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 29 bc a8 ca eb ac d5 06 36 40 e1 |0D. S).......6@.|
00000010 c7 85 97 d3 c8 bf de 31 32 34 45 bc 5f 7b df ab |.......124E._{..|
00000020 8b c1 4a bb 02 20 2d df 8b a8 d3 96 6f 32 c8 cc |..J.. -.....o2..|
00000030 2d bd 4a 06 03 86 bc ff d1 5d a0 11 de 9f a6 2a |-.J......].....*|
00000040 69 aa 61 50 c0 2e |i.aP..|
[842e 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[842f 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a76eb0 gate 1578074245428595000 evaluation starts
[8430 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a76eb0 signed by 0 principal evaluation starts (used [false])
[8431 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a76eb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8432 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a76eb0 principal evaluation succeeds for identity 0
[8433 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a76eb0 gate 1578074245428595000 evaluation succeeds
[8434 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8435 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8436 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8437 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8438 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[8439 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[843a 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[843b 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 fa f0 bb da 15 c7 2a 53 e9 31 88 b0 e4 89 20 |.......*S.1.... |
00000010 a5 02 15 0a 1b e2 67 97 36 56 e9 e3 d6 b1 09 ec |......g.6V......|
[843c 01-03 17:57:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 f4 8d ad 1c 55 ec 54 29 ab 4b |0E.!......U.T).K|
00000010 6d a6 9d 09 2b 9b 05 17 19 85 a2 a3 eb 04 65 1c |m...+.........e.|
00000020 22 f5 4d 45 01 02 20 52 e4 af 8f 1d 4c a8 19 e4 |".ME.. R....L...|
00000030 f4 19 09 ea f2 cd a6 39 fb eb d2 25 14 43 7c 72 |.......9...%.C|r|
00000040 d3 b6 f9 05 6c 2f ac |....l/.|
[843d 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[843e 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[843f 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[8440 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 16 9e 1f 4b e0 c5 5f b9 ae b4 06 2c 4f ed 85 |t...K.._....,O..|
00000010 e3 4f a3 df 08 38 eb d6 b0 9f 79 87 bf 43 f7 ca |.O...8....y..C..|
[8441 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 9c bc c2 1d f2 e8 ca 43 33 14 |0E.!.........C3.|
00000010 c4 11 24 dc ed e3 d2 cf bd 99 40 dd 3c 7b 6f f7 |..$.......@.<{o.|
00000020 79 ca 43 bf 24 02 20 48 29 43 83 40 5f 4f 30 9b |y.C.$. H)C.@_O0.|
00000030 69 8b 70 0d 46 54 00 f2 e5 d2 b9 fa 2d 5c 12 df |i.p.FT......-\..|
00000040 0f cb 6c d8 4b f2 58 |..l.K.X|
[8442 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[8443 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[8444 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8445 01-03 17:57:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8446 01-03 17:57:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8447 01-03 17:57:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8448 01-03 17:57:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[8449 01-03 17:57:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[844a 01-03 17:57:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[844b 01-03 17:57:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10101742393666775303 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[844c 01-03 17:57:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10101742393666775303 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[844d 01-03 17:57:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[844e 01-03 17:57:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10101742393666775303 , Msg_type: BLOCK_MSG, digests: [7 8 2 1 3 4 5 6], Envelope: 58 bytes, Signature: 0 bytes
[844f 01-03 17:57:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10101742393666775303 , Msg_type: BLOCK_MSG, digests: [7 8 2 1 3 4 5 6], Envelope: 58 bytes, Signature: 0 bytes
[8450 01-03 17:57:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8451 01-03 17:57:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[8452 01-03 17:57:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8453 01-03 17:57:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8454 01-03 17:57:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8455 01-03 17:57:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12858621164639551204 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[8456 01-03 17:57:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12858621164639551204 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[8457 01-03 17:57:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[8458 01-03 17:57:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8459 01-03 17:57:26.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[845a 01-03 17:57:26.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[845b 01-03 17:57:26.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[845c 01-03 17:57:26.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[845d 01-03 17:57:26.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[845e 01-03 17:57:26.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[845f 01-03 17:57:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[8460 01-03 17:57:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[8461 01-03 17:57:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8462 01-03 17:57:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8463 01-03 17:57:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8464 01-03 17:57:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8465 01-03 17:57:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[8466 01-03 17:57:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[8467 01-03 17:57:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510211801
[8468 01-03 17:57:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8A8337B2342D4007EEA1ACE8F2CBECAB3CB9B2D3CF3721953786535581230C73
[8469 01-03 17:57:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[846a 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[846b 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[846c 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[846d 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[846e 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:33 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[846f 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8470 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8471 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:33 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[8472 01-03 17:57:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8473 01-03 17:57:26.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:57826 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8474 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8475 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8476 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8477 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 0d d3 29 0f 75 c3 98 e5 2c 14 2b a7 e3 14 4a |6..).u...,.+...J|
00000010 72 e1 b0 2e 7a a0 af 78 7c 62 3c 77 be 05 4f 0b |r...z..x|b<w..O.|
[8478 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 5f d5 3e 84 f3 d3 90 95 0f b9 |0E.!.._.>.......|
00000010 f9 1e 10 f9 0b 68 c6 bc a5 d5 1b cd 3a 3d de f0 |.....h......:=..|
00000020 39 cf ac 4a 14 02 20 1b 9b bd 36 1e 49 f2 d1 27 |9..J.. ...6.I..'|
00000030 a8 0c 39 2c d7 c4 93 9c dc f9 a8 37 d8 f7 97 92 |..9,.......7....|
00000040 25 2d 10 f6 eb bf 8d |%-.....|
[8479 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[847a 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 49 67 9f 5d 66 fe dc 3e 50 2b |0E.!..Ig.]f..>P+|
00000010 c9 45 c7 a4 52 04 e1 d3 6e 25 1c 39 cf fa 20 c2 |.E..R...n%.9.. .|
00000020 55 d5 46 ab 8e 02 20 1f 2d 72 47 7b 33 3b de ad |U.F... .-rG{3;..|
00000030 dc 68 80 65 8f a4 e0 73 2a 9f 91 b0 33 36 89 14 |.h.e...s*...36..|
00000040 08 ab 8b 09 3d 2b b7 |....=+.|
[847b 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[847c 01-03 17:57:26.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[847d 01-03 17:57:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91
[847e 01-03 17:57:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91
[847f 01-03 17:57:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[8480 01-03 17:57:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8481 01-03 17:57:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8482 01-03 17:57:26.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8483 01-03 17:57:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[8484 01-03 17:57:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[8485 01-03 17:57:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8486 01-03 17:57:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[8487 01-03 17:57:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8488 01-03 17:57:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[8489 01-03 17:57:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[848a 01-03 17:57:26.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[848b 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[848c 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[848d 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[848e 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[848f 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8490 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8491 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8492 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8493 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[8494 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8495 01-03 17:57:26.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[8496 01-03 17:57:26.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8497 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8498 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[8499 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[849a 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[849b 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[849c 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 36 97 3a b9 4a 74 d4 df 56 d4 ea fc a0 f4 a7 |.6.:.Jt..V......|
00000010 d6 76 71 ae 3c 64 44 6e 34 62 e9 c8 0a 7c 70 02 |.vq.<dDn4b...|p.|
[849d 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df e6 c1 53 4a 66 30 44 86 f4 5e |0E.!....SJf0D..^|
00000010 10 27 aa c7 65 80 50 e0 38 90 cd 95 3e 49 6c 82 |.'..e.P.8...>Il.|
00000020 35 b9 cd 6f 51 02 20 66 10 ba 7f 48 8d 23 9a ec |5..oQ. f...H.#..|
00000030 f7 9c 27 21 99 2e c3 56 48 ba 8f c8 01 67 b4 e6 |..'!...VH....g..|
00000040 94 9a e2 5a c0 95 64 |...Z..d|
[849e 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[849f 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a19d20 gate 1578074247185750100 evaluation starts
[84a0 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a19d20 signed by 0 principal evaluation starts (used [false])
[84a1 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a19d20 processing identity 0 - &{OrdererMSP 16c570755ade2843c6b8be6b0908a0996f164ef2afb090324760062472a35227}
[84a2 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a19d20 principal evaluation succeeds for identity 0
[84a3 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a19d20 gate 1578074247185750100 evaluation succeeds
[84a4 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[84a5 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[84a6 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[84a7 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[84a8 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [9] channel=businesschannel
[84a9 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [9]
[84aa 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[84ab 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [9] channel=businesschannel
[84ac 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34881 bytes, seq: 9}, Envelope: 34914 bytes, Signature: 0 bytes to the block puller
[84ad 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Added 9, total items: 9
[84ae 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]
[84af 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger
[84b0 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [9] from buffer
[84b1 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [9]
[84b2 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [9]
[84b3 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[84b4 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00476fd40 env 0xc004ac04b0 txn 0
[84b5 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004ac04b0
[84b6 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\207\201\276\360\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\322'\177)B\241\202&\216\224\372\306\235\250^\2776U2\230\246`\255\237"
[84b7 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1
[84b8 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[84b9 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[84ba 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84bb 01-03 17:57:27.18 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[84bc 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}
[84bd 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[84be 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[84bf 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 89 70 8a 64 dc 1f 53 08 f0 7b d7 c2 f9 26 e2 |..p.d..S..{...&.|
00000010 68 f4 7c 14 4a 4b 45 bb 25 8b a6 e0 94 d3 26 c5 |h.|.JKE.%.....&.|
[84c0 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 a3 43 e0 ca a6 1b 00 59 48 2e ef |0D. h.C.....YH..|
00000010 08 e7 f0 02 f1 1f 83 b5 e0 4f 1f 19 54 f1 45 94 |.........O..T.E.|
00000020 96 4b 71 d6 02 20 25 67 7d ae dc f7 07 30 ee 4b |.Kq.. %g}....0.K|
00000030 75 eb 84 15 27 c2 d5 96 54 a8 bc 77 b8 80 f4 b4 |u...'...T..w....|
00000040 6c 64 63 e1 c6 85 |ldc...|
[84c1 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[84c2 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc004b6a000, header channel_header:"\010\001\032\006\010\207\201\276\360\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\322'\177)B\241\202&\216\224\372\306\235\250^\2776U2\230\246`\255\237"
[84c3 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[84c4 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[84c5 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[84c6 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[84c7 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[84c8 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[84c9 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[84ca 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[84cb 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84cc 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84ce 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84cf 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84d0 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34881 bytes, seq: 9}, Envelope: 34914 bytes, Signature: 0 bytes to 1 peers
[84d1 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84d2 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84cd 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[84d4 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[84d5 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[84d6 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[84d7 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[84d3 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34881 bytes, seq: 9}, Envelope: 34914 bytes, Signature: 0 bytes
[84d8 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[84d9 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[84da 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84db 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[84dc 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP
[84dd 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP
[84de 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins
[84df 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement
[84e0 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers
[84e1 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers
[84e2 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[84e3 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[84e4 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[84e5 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[84e6 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[84e7 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[84e8 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[84e9 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers
[84ea 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP
[84eb 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins
[84ec 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP
[84ed 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement
[84ee 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers
[84ef 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application
[84f0 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins
[84f1 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path []
[84f2 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[84f3 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[84f4 01-03 17:57:27.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[84f5 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[84f6 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[84f7 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[84f8 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[84f9 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[84fa 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Admins ==
[84fb 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[84fc 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==
[84fd 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 bc e3 5b 2a 5b 98 f4 c7 c2 bb fa 03 c3 e6 4b |...[*[.........K|
00000010 8d 90 ac 20 02 20 08 d1 c2 79 2b 67 af 21 6b f4 |... . ...y+g.!k.|
[84fe 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 84 15 aa 9f e2 02 cb 30 4e 1e 45 |0D. 4.......0N.E|
00000010 76 c4 d3 c7 8d 0c 2a 66 ae 37 99 55 e8 d2 de 52 |v.....*f.7.U...R|
00000020 4a e5 3b 6c 02 20 4f 3d 18 8a d6 00 3b 1d 41 9b |J.;l. O=....;.A.|
00000030 43 0d 13 d2 32 79 8b e6 6d 2b 57 63 3f 87 09 5b |C...2y..m+Wc?..[|
00000040 c7 5a d8 a4 25 ca |.Z..%.|
[84ff 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8500 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 5c 3f bb 64 5a 2c c7 2e 9d a0 e3 15 ca ac df |.\?.dZ,.........|
00000010 ee d8 27 c8 3d 07 aa 08 9a d8 b1 97 9d 3c dc 60 |..'.=........<.`|
[8501 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d be 9e 20 64 e0 7d b6 15 c8 46 1d |0D. =.. d.}...F.|
00000010 8d d4 1e 09 90 ee d1 ad 2f 05 d4 cf 31 ec 1d 1b |......../...1...|
00000020 f3 63 42 aa 02 20 18 1a 8f aa e4 97 69 06 c3 98 |.cB.. ......i...|
00000030 9b 09 e4 ae 3b 88 88 50 ad 01 29 07 eb a0 51 ab |....;..P..)...Q.|
00000040 e2 ff a6 80 94 77 |.....w|
[8502 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 1 validated
[8503 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set
[8504 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6d50 gate 1578074247207627200 evaluation starts
[8505 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6d50 signed by 0 principal evaluation starts (used [false false])
[8506 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6d50 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[8507 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP
[8508 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6d50 principal evaluation succeeds for identity 0
[8509 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6d50 gate 1578074247207627200 evaluation succeeds
[850a 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins
[850b 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins
[850c 01-03 17:57:27.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==
[850d 01-03 17:57:27.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 bc e3 5b 2a 5b 98 f4 c7 c2 bb fa 03 c3 e6 4b |...[*[.........K|
00000010 8d 90 ac 20 02 20 08 d1 c2 79 2b 67 af 21 6b f4 |... . ...y+g.!k.|
[850e 01-03 17:57:27.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 84 15 aa 9f e2 02 cb 30 4e 1e 45 |0D. 4.......0N.E|
00000010 76 c4 d3 c7 8d 0c 2a 66 ae 37 99 55 e8 d2 de 52 |v.....*f.7.U...R|
00000020 4a e5 3b 6c 02 20 4f 3d 18 8a d6 00 3b 1d 41 9b |J.;l. O=....;.A.|
00000030 43 0d 13 d2 32 79 8b e6 6d 2b 57 63 3f 87 09 5b |C...2y..m+Wc?..[|
00000040 c7 5a d8 a4 25 ca |.Z..%.|
[850f 01-03 17:57:27.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8510 01-03 17:57:27.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 5c 3f bb 64 5a 2c c7 2e 9d a0 e3 15 ca ac df |.\?.dZ,.........|
00000010 ee d8 27 c8 3d 07 aa 08 9a d8 b1 97 9d 3c dc 60 |..'.=........<.`|
[8511 01-03 17:57:27.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d be 9e 20 64 e0 7d b6 15 c8 46 1d |0D. =.. d.}...F.|
00000010 8d d4 1e 09 90 ee d1 ad 2f 05 d4 cf 31 ec 1d 1b |......../...1...|
00000020 f3 63 42 aa 02 20 18 1a 8f aa e4 97 69 06 c3 98 |.cB.. ......i...|
00000030 9b 09 e4 ae 3b 88 88 50 ad 01 29 07 eb a0 51 ab |....;..P..)...Q.|
00000040 e2 ff a6 80 94 77 |.....w|
[8512 01-03 17:57:27.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 1 validated
[8513 01-03 17:57:27.22 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set
[8514 01-03 17:57:27.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc73b0 gate 1578074247221524200 evaluation starts
[8515 01-03 17:57:27.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc73b0 signed by 0 principal evaluation starts (used [false false])
[8516 01-03 17:57:27.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc73b0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[8517 01-03 17:57:27.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc73b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[8518 01-03 17:57:27.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc73b0 processing identity 1 - &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}
[8519 01-03 17:57:27.23 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP
[851a 01-03 17:57:27.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc73b0 principal evaluation succeeds for identity 1
[851b 01-03 17:57:27.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc73b0 gate 1578074247221524200 evaluation succeeds
[851c 01-03 17:57:27.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins
[851d 01-03 17:57:27.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins
[851e 01-03 17:57:27.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins
[851f 01-03 17:57:27.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Admins
[8520 01-03 17:57:27.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins"
[8521 01-03 17:57:27.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[8522 01-03 17:57:27.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[8523 01-03 17:57:27.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[8524 01-03 17:57:27.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[8525 01-03 17:57:27.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[8526 01-03 17:57:27.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[8527 01-03 17:57:27.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[8528 01-03 17:57:27.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[8529 01-03 17:57:27.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins"
[852a 01-03 17:57:27.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[852b 01-03 17:57:27.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[852c 01-03 17:57:27.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[852d 01-03 17:57:27.26 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins"
[852e 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[852f 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins"
[8530 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins"
[8531 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins"
[8532 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org3MSP\020\001" > mod_policy:"Admins"
[8533 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to
[8534 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to
[8535 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to
[8536 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to
[8537 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to
[8538 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[8539 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[853a 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[853b 01-03 17:57:27.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[853c 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[853d 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[853e 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[853f 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[8540 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[8541 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[8542 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[8543 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[8544 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[8545 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[8546 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[8547 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[8548 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 >
[8549 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[854a 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[854b 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[854c 01-03 17:57:27.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[854d 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[854e 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[854f 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[8550 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[8551 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[8552 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[8553 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[8554 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[8555 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[8556 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 >
[8557 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[8558 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[8559 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[855a 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[855b 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[855c 01-03 17:57:27.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[855d 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[855e 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[855f 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[8560 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[8561 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[8562 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[8563 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[8564 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are
[8565 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP
[8566 01-03 17:57:27.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[8567 01-03 17:57:27.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[8568 01-03 17:57:27.34 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP
[8569 01-03 17:57:27.36 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw
WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE
AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB
6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU
BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg
rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw
RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc
CB8UKt+GsH3/7ADrNo7ofOg7BzMonw==
-----END CERTIFICATE-----
[856a 01-03 17:57:27.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[856b 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org3MSP checking if the identity is a client
[856c 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org3MSP getting certification chain
[856d 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org3MSP checking if the identity is a client
[856e 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[856f 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[8570 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[8571 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[8572 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[8573 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[8574 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[8575 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[8576 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[8577 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[8578 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[8579 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[857a 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[857b 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[857c 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[857d 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[857e 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE
BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI
zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn
Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG
A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW
tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa
0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==
-----END CERTIFICATE-----
[857f 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[8580 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps)
[8581 01-03 17:57:27.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps
[8582 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP
[8583 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP
[8584 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP
[8585 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP
[8586 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP
[8587 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP
[8588 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP
[8589 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP
[858a 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP
[858b 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP
[858c 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP
[858d 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP
[858e 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application
[858f 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application
[8590 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application
[8591 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application
[8592 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application
[8593 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg
[8594 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg
[8595 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg
[8596 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer
[8597 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer
[8598 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer
[8599 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer
[859a 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel
[859b 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel
[859c 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel
[859d 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[859e 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[859f 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[85a0 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[85a1 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers
[85a2 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[85a3 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[85a4 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[85a5 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[85a6 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP
[85a7 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP
[85a8 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers
[85a9 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins
[85aa 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement
[85ab 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers
[85ac 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[85ad 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers
[85ae 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[85af 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[85b0 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[85b1 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[85b2 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[85b3 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[85b4 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[85b5 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[85b6 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[85b7 01-03 17:57:27.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[85b8 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[85b9 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[85ba 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer
[85bb 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg
[85bc 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP
[85bd 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers
[85be 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins
[85bf 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers
[85c0 01-03 17:57:27.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities
[85c1 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType
[85c2 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize
[85c3 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout
[85c4 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions
[85c5 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers
[85c6 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers
[85c7 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins
[85c8 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation
[85c9 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses
[85ca 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities
[85cb 01-03 17:57:27.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm
[85cc 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium
[85cd 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure
[85ce 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers
[85cf 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers
[85d0 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins
[85d1 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers'
[85d2 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers'
[85d3 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[85d4 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[85d5 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[85d6 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[85d7 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[85d8 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[85d9 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP
[85da 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers'
[85db 01-03 17:57:27.42 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers'
[85dc 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins'
[85dd 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer]
[85de 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[85df 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[85e0 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path []
[85e1 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg
[85e2 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation'
[85e3 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins'
[85e4 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers'
[85e5 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers'
[85e6 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[85e7 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[85e8 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing updates for orderer endpoints channel=businesschannel
[85e9 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU No orderer endpoint addresses or TLS certs were changed channel=businesschannel
[85ea 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel
[85eb 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel
[85ec 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]
[85ed 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: []
[85ee 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]
[85ef 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[85f0 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[85f1 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[85f2 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[85f3 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[85f4 01-03 17:57:27.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[85f5 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[85f6 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[85f7 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[85f8 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfb400 gate 1578074247440508300 evaluation starts
[85f9 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfb400 signed by 0 principal evaluation starts (used [false])
[85fa 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfb400 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[85fb 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfb400 principal evaluation succeeds for identity 0
[85fc 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfb400 gate 1578074247440508300 evaluation succeeds
[85fd 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[85fe 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[85ff 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8600 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8601 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8602 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8603 01-03 17:57:27.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8604 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8605 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8606 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8607 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8608 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8609 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[860a 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0a190 gate 1578074247453378900 evaluation starts
[860b 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0a190 signed by 0 principal evaluation starts (used [false])
[860c 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0a190 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[860d 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0a190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[860e 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0a190 principal evaluation fails
[860f 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0a190 gate 1578074247453378900 evaluation fails
[8610 01-03 17:57:27.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8611 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8612 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8613 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8614 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8615 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8616 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0aa90 gate 1578074247465819000 evaluation starts
[8617 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0aa90 signed by 0 principal evaluation starts (used [false])
[8618 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0aa90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8619 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0aa90 principal evaluation succeeds for identity 0
[861a 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0aa90 gate 1578074247465819000 evaluation succeeds
[861b 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[861c 01-03 17:57:27.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[861d 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[861e 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[861f 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8620 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8621 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8622 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8623 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8624 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8625 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8626 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8627 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8628 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b820 gate 1578074247472898700 evaluation starts
[8629 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b820 signed by 0 principal evaluation starts (used [false])
[862a 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b820 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[862b 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[862c 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b820 principal evaluation fails
[862d 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b820 gate 1578074247472898700 evaluation fails
[862e 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[862f 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8630 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8631 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8632 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8633 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8634 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c120 gate 1578074247479306300 evaluation starts
[8635 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c120 signed by 0 principal evaluation starts (used [false])
[8636 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c120 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8637 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c120 principal evaluation succeeds for identity 0
[8638 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c120 gate 1578074247479306300 evaluation succeeds
[8639 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[863a 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[863b 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[863c 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[863d 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations
[863e 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]
[863f 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: <nil>, Metadata:
[8640 01-03 17:57:27.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8641 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[8642 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[8643 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] <nil>}
[8644 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[8645 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d1d000, CONNECTING
[8646 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about
[8647 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]
[8648 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself
[8649 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[864a 01-03 17:57:27.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[864b 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[864c 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[864d 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel
[864e 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP]
[864f 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP]
[8650 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP]
[8651 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel
[8652 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00476fd40 env 0xc004ac04b0 txn 0
[8653 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[8654 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [9] in 319ms
[8655 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> WARN Invalid transaction type: header type is not an endorser transaction
[8656 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[8657 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[8658 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [9] channel=businesschannel
[8659 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [9]
[865a 01-03 17:57:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[865b 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[865c 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[865d 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [9]
[865e 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[865f 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG
[8660 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG]
[8661 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.ConfigTxProcessor{}
[8662 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[8663 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = []
[8664 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG
[8665 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[8666 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[8667 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]
[8668 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"CHANNEL_CONFIG_ENV_BYTES"}:(*internal.keyOps)(0xc00467aec0)}
[8669 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[866a 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[866b 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[866c 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [9]
[866d 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [9] to storage
[866e 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [9] to pvt block store
[866f 01-03 17:57:27.51 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [9]
[8670 01-03 17:57:27.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [9]
[8671 01-03 17:57:27.52 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=9, blockHash=[]byte{0xb2, 0xe5, 0x8c, 0xd0, 0xf8, 0x86, 0xa9, 0x2e, 0xac, 0xa7, 0x75, 0xef, 0x74, 0x55, 0x3b, 0xa, 0x4b, 0xfb, 0xb5, 0x20, 0x53, 0xef, 0x8b, 0x12, 0x58, 0x1f, 0xec, 0x37, 0xaf, 0x9a, 0x22, 0x53} txOffsets=
txId=d26a4b2ca69b00dabaa10f1493f16bd7680a075c98e7f4434a967067afb894bd locPointer=offset=71, bytesLength=33870
]
[8672 01-03 17:57:27.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=99039, bytesLength=33870] for tx ID: [d26a4b2ca69b00dabaa10f1493f16bd7680a075c98e7f4434a967067afb894bd] to txid-index
[8673 01-03 17:57:27.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=99039, bytesLength=33870] for tx number:[0] ID: [d26a4b2ca69b00dabaa10f1493f16bd7680a075c98e7f4434a967067afb894bd] to blockNumTranNum index
[8674 01-03 17:57:27.52 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133871], isChainEmpty=[false], lastBlockNumber=[9]
[8675 01-03 17:57:27.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [9] transactions to state database
[8676 01-03 17:57:27.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[8677 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[8678 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[8679 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[867a 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dCHANNEL_CONFIG_ENV_BYTES] key(bytes)=[[]byte{0x64, 0x0, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x45, 0x4e, 0x56, 0x5f, 0x42, 0x59, 0x54, 0x45, 0x53}]
[867b 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[867c 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [10]
[867d 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[867e 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [9] transactions to history database
[867f 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions
[8680 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction
[8681 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]
[8682 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [10]
[8683 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [9]
[8684 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [9] with 1 transaction(s) in 25ms (state_validation=8ms block_and_pvtdata_commit=12ms state_commit=3ms) commitHash=[aadb8a8caa94ed18fabd2f19a211897695f131abd70880f4d13310695a00632e]
[8685 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6A121408908FF491D1C09CF315...2A0E080A1A0A0A056578703032120131
[8686 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E54853D6EB0A6BD5FD9A38E1802F7953236ADB3C6E077158A499E5C70BF6B33D
[8687 01-03 17:57:27.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [9] with 1 transaction(s)
[8688 01-03 17:57:27.55 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d1d000, READY
[8689 01-03 17:57:27.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[868a 01-03 17:57:27.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[868b 01-03 17:57:27.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051
[868c 01-03 17:57:27.58 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:57:29.582Z grpc.peer_address=172.18.0.8:47598 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.8µs
[868d 01-03 17:57:27.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[868e 01-03 17:57:27.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[868f 01-03 17:57:27.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:47598
[8690 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:47598
[8692 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8693 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8694 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[8695 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[8691 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051
[8696 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[8697 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8698 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8699 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[869a 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[869b 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[869c 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[869e 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[869f 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[86a0 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[86a1 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[86a2 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[86a3 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[86a4 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[869d 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86a5 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 80 92 aa 37 ce 2a c7 97 78 a3 |0E.!.....7.*..x.|
00000010 3f 19 33 e1 d7 21 72 a6 cd 1d 34 d0 25 d9 2f b5 |?.3..!r...4.%./.|
00000020 79 6c f7 83 06 02 20 33 ce 3c 27 bb 1b 5a 8a ce |yl.... 3.<'..Z..|
00000030 e3 a6 21 bb 0d e8 97 71 19 c2 81 b0 c4 e9 ca 9e |..!....q........|
00000040 72 8c 0f 9d df 80 00 |r......|
[86a6 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[86a8 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86a7 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86a9 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5eb10 gate 1578074247618458500 evaluation starts
[86aa 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5eb10 signed by 0 principal evaluation starts (used [false])
[86ab 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5eb10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[86ac 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5eb10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[86ad 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5eb10 principal evaluation fails
[86ae 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[86b0 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[86b1 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[86b2 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[86b3 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[86af 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5eb10 gate 1578074247618458500 evaluation fails
[86b4 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[86b5 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[86b6 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[86b7 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 45 b7 a2 48 a7 66 ca b8 cd 20 |0E.!..E..H.f... |
00000010 7b 9b 10 0c a3 51 5f f7 46 df 6f 01 c4 cc c2 d4 |{....Q_.F.o.....|
00000020 ae e2 7b 2d fd 02 20 75 b6 1f 42 a6 91 bd dc 6c |..{-.. u..B....l|
00000030 f1 bb 24 3c 02 d7 93 9c 4b ca 0a de 47 10 2d fb |..$<....K...G.-.|
00000040 d4 9e 58 0b 0d 42 b0 |..X..B.|
[86b8 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[86b9 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[86ba 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[86bb 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 80 92 aa 37 ce 2a c7 97 78 a3 |0E.!.....7.*..x.|
00000010 3f 19 33 e1 d7 21 72 a6 cd 1d 34 d0 25 d9 2f b5 |?.3..!r...4.%./.|
00000020 79 6c f7 83 06 02 20 33 ce 3c 27 bb 1b 5a 8a ce |yl.... 3.<'..Z..|
00000030 e3 a6 21 bb 0d e8 97 71 19 c2 81 b0 c4 e9 ca 9e |..!....q........|
00000040 72 8c 0f 9d df 80 00 |r......|
[86bc 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86bd 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7a940 gate 1578074247619782200 evaluation starts
[86be 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7a940 signed by 0 principal evaluation starts (used [false])
[86bf 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7a940 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[86c0 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86c1 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7a940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[86c2 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7a940 principal evaluation fails
[86c3 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7e2f0 gate 1578074247619895300 evaluation starts
[86c4 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7a940 gate 1578074247619782200 evaluation fails
[86c5 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7e2f0 signed by 0 principal evaluation starts (used [false])
[86c6 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[86c7 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[86c8 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7e2f0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[86c9 01-03 17:57:27.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[86ca 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7e2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[86cb 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[86cc 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7e2f0 principal evaluation fails
[86cd 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7e2f0 gate 1578074247619895300 evaluation fails
[86ce 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 45 b7 a2 48 a7 66 ca b8 cd 20 |0E.!..E..H.f... |
00000010 7b 9b 10 0c a3 51 5f f7 46 df 6f 01 c4 cc c2 d4 |{....Q_.F.o.....|
00000020 ae e2 7b 2d fd 02 20 75 b6 1f 42 a6 91 bd dc 6c |..{-.. u..B....l|
00000030 f1 bb 24 3c 02 d7 93 9c 4b ca 0a de 47 10 2d fb |..$<....K...G.-.|
00000040 d4 9e 58 0b 0d 42 b0 |..X..B.|
[86cf 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[86d0 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[86d1 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[86d2 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86d3 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[86d4 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 80 92 aa 37 ce 2a c7 97 78 a3 |0E.!.....7.*..x.|
00000010 3f 19 33 e1 d7 21 72 a6 cd 1d 34 d0 25 d9 2f b5 |?.3..!r...4.%./.|
00000020 79 6c f7 83 06 02 20 33 ce 3c 27 bb 1b 5a 8a ce |yl.... 3.<'..Z..|
00000030 e3 a6 21 bb 0d e8 97 71 19 c2 81 b0 c4 e9 ca 9e |..!....q........|
00000040 72 8c 0f 9d df 80 00 |r......|
[86d5 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7b240 gate 1578074247620183400 evaluation starts
[86d6 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7b240 signed by 0 principal evaluation starts (used [false])
[86d7 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7b240 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[86d8 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7b240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[86d9 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7b240 principal evaluation fails
[86da 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7b240 gate 1578074247620183400 evaluation fails
[86db 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[86dc 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[86dd 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[86de 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[86df 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 45 b7 a2 48 a7 66 ca b8 cd 20 |0E.!..E..H.f... |
00000010 7b 9b 10 0c a3 51 5f f7 46 df 6f 01 c4 cc c2 d4 |{....Q_.F.o.....|
00000020 ae e2 7b 2d fd 02 20 75 b6 1f 42 a6 91 bd dc 6c |..{-.. u..B....l|
00000030 f1 bb 24 3c 02 d7 93 9c 4b ca 0a de 47 10 2d fb |..$<....K...G.-.|
00000040 d4 9e 58 0b 0d 42 b0 |..X..B.|
[86e1 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86e0 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86e2 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7bb40 gate 1578074247620611800 evaluation starts
[86e3 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7ec10 gate 1578074247620611800 evaluation starts
[86e4 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7bb40 signed by 0 principal evaluation starts (used [false])
[86e5 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7ec10 signed by 0 principal evaluation starts (used [false])
[86e6 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7bb40 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[86e7 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7ec10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[86e8 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[86e9 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[86ea 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[86eb 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[86ec 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7bb40 principal evaluation succeeds for identity 0
[86ed 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7ec10 principal evaluation succeeds for identity 0
[86ee 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7ec10 gate 1578074247620611800 evaluation succeeds
[86ef 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7bb40 gate 1578074247620611800 evaluation succeeds
[86f1 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[86f0 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[86f2 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[86f3 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[86f4 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[86f5 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[86f6 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[86f7 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[86f8 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051
[86f9 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:47598
[86fa 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:47598
[86fb 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86fc 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[86fd 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[86fe 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315105C
[86ff 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 132812772A2064388DBB26CBE7A5C0D635ECD14EF2027EACB1C4FA58FD9A0D23
[8700 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8701 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8702 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8703 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[8704 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8705 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 4574661552276991968, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers
[8706 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8707 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4574661552276991968, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes
[8708 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8709 01-03 17:57:27.62 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:57:29.626Z grpc.peer_address=172.18.0.7:50248 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=93.2µs
[870a 01-03 17:57:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[870b 01-03 17:57:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[870c 01-03 17:57:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:50248
[870d 01-03 17:57:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:50248
[870e 01-03 17:57:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[870f 01-03 17:57:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8710 01-03 17:57:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[8711 01-03 17:57:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[8712 01-03 17:57:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[8713 01-03 17:57:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8714 01-03 17:57:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8715 01-03 17:57:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8716 01-03 17:57:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8717 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8718 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8719 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[871a 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[871b 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[871c 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[871d 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[871e 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 35 69 b3 5b ff 51 56 85 f3 b7 |0E.!..5i.[.QV...|
00000010 63 88 b6 94 75 24 9e fb 90 76 7b 64 50 c4 5d 73 |c...u$...v{dP.]s|
00000020 d2 25 b2 24 40 02 20 3c 1a 10 e4 b5 ef 3a 37 64 |.%.$@. <.....:7d|
00000030 0e 4c 49 4a f6 a3 ee 21 85 07 da 93 79 3d 99 9a |.LIJ...!....y=..|
00000040 c0 4d aa c6 14 92 f9 |.M.....|
[871f 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8720 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdf440 gate 1578074247664218900 evaluation starts
[8721 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdf440 signed by 0 principal evaluation starts (used [false])
[8722 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdf440 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8723 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdf440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8724 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdf440 principal evaluation fails
[8725 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdf440 gate 1578074247664218900 evaluation fails
[8726 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8727 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8728 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8729 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[872a 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 35 69 b3 5b ff 51 56 85 f3 b7 |0E.!..5i.[.QV...|
00000010 63 88 b6 94 75 24 9e fb 90 76 7b 64 50 c4 5d 73 |c...u$...v{dP.]s|
00000020 d2 25 b2 24 40 02 20 3c 1a 10 e4 b5 ef 3a 37 64 |.%.$@. <.....:7d|
00000030 0e 4c 49 4a f6 a3 ee 21 85 07 da 93 79 3d 99 9a |.LIJ...!....y=..|
00000040 c0 4d aa c6 14 92 f9 |.M.....|
[872b 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[872c 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdfd60 gate 1578074247666056300 evaluation starts
[872d 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdfd60 signed by 0 principal evaluation starts (used [false])
[872e 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdfd60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[872f 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdfd60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8730 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdfd60 principal evaluation fails
[8731 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fdfd60 gate 1578074247666056300 evaluation fails
[8732 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8733 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8734 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8735 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[8736 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 35 69 b3 5b ff 51 56 85 f3 b7 |0E.!..5i.[.QV...|
00000010 63 88 b6 94 75 24 9e fb 90 76 7b 64 50 c4 5d 73 |c...u$...v{dP.]s|
00000020 d2 25 b2 24 40 02 20 3c 1a 10 e4 b5 ef 3a 37 64 |.%.$@. <.....:7d|
00000030 0e 4c 49 4a f6 a3 ee 21 85 07 da 93 79 3d 99 9a |.LIJ...!....y=..|
00000040 c0 4d aa c6 14 92 f9 |.M.....|
[8737 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8738 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff0680 gate 1578074247668903100 evaluation starts
[8739 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff0680 signed by 0 principal evaluation starts (used [false])
[873a 01-03 17:57:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff0680 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[873b 01-03 17:57:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[873c 01-03 17:57:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[873d 01-03 17:57:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff0680 principal evaluation succeeds for identity 0
[873e 01-03 17:57:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff0680 gate 1578074247668903100 evaluation succeeds
[873f 01-03 17:57:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8743 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8744 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8740 01-03 17:57:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[8741 01-03 17:57:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:47598 disconnected
[8742 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8745 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8746 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:57:37.589Z grpc.peer_address=172.18.0.8:47598 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=91.3744ms
[8748 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8747 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:50248
[8749 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:50248
[874a 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[874b 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[874c 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[874d 01-03 17:57:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[874e 01-03 17:57:27.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:57:29.693Z grpc.peer_address=172.18.0.5:58036 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=95.7µs
[874f 01-03 17:57:27.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[8750 01-03 17:57:27.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[8751 01-03 17:57:27.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:58036
[8752 01-03 17:57:27.70 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:58036
[8753 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|
[8754 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ed 28 4a e9 ef d0 b8 62 c2 ad |0E.!...(J....b..|
00000010 b3 81 b8 84 68 e2 7c 10 9e 4e 90 be 13 c0 6c a2 |....h.|..N....l.|
00000020 bd 21 cf 6a d6 02 20 42 e8 31 08 e9 2c 1d 67 23 |.!.j.. B.1..,.g#|
00000030 95 a7 b7 fa 95 0e e4 d6 f2 8a 8d 15 08 b9 bb 21 |...............!|
00000040 d3 c5 cb 31 65 f1 0f |...1e..|
[8755 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:58036
[8756 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:58036
[8757 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8758 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[8759 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:57826 disconnected
[875a 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:57826 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m34.8005923s
[875b 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[875c 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[875d 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[875e 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:58036 disconnected
[875f 01-03 17:57:27.71 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:57:37.707Z grpc.peer_address=172.18.0.5:58036 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=8.0065ms
[8760 01-03 17:57:27.72 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8761 01-03 17:57:27.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[8762 01-03 17:57:27.72 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:50248 disconnected
[8763 01-03 17:57:27.72 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-01-03T17:57:37.631Z grpc.peer_address=172.18.0.7:50248 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=84.2853ms
[8764 01-03 17:57:27.72 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8765 01-03 17:57:27.72 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8766 01-03 17:57:27.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8767 01-03 17:57:27.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:57:29.744Z grpc.peer_address=172.18.0.8:47606 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.1896ms
[8768 01-03 17:57:27.76 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-01-03T17:57:29.767Z grpc.peer_address=172.18.0.7:50256 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99µs
[8769 01-03 17:57:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[876a 01-03 17:57:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[876b 01-03 17:57:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:50256
[876c 01-03 17:57:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:50256
[876d 01-03 17:57:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[876e 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[876f 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8770 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8771 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8772 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8773 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8774 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8775 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8776 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8777 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8778 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[8779 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 77 f7 00 ae e1 18 a8 f4 5d 8d |0E.!..w.......].|
00000010 53 81 7b 03 ca a5 00 db b3 f4 32 dd 4c 89 5e a7 |S.{.......2.L.^.|
00000020 f7 40 d6 69 cc 02 20 1f 60 cc 75 6f d2 14 52 ac |.@.i.. .`.uo..R.|
00000030 50 95 e6 a7 55 07 80 54 65 ac 94 f5 e2 02 13 66 |P...U..Te......f|
00000040 8d ff 57 b9 6c e9 6d |..W.l.m|
[877a 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[877b 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050ad840 gate 1578074247772112500 evaluation starts
[877c 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050ad840 signed by 0 principal evaluation starts (used [false])
[877d 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050ad840 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[877e 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050ad840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[877f 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050ad840 principal evaluation fails
[8780 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050ad840 gate 1578074247772112500 evaluation fails
[8781 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8782 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8783 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8784 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[8785 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 77 f7 00 ae e1 18 a8 f4 5d 8d |0E.!..w.......].|
00000010 53 81 7b 03 ca a5 00 db b3 f4 32 dd 4c 89 5e a7 |S.{.......2.L.^.|
00000020 f7 40 d6 69 cc 02 20 1f 60 cc 75 6f d2 14 52 ac |.@.i.. .`.uo..R.|
00000030 50 95 e6 a7 55 07 80 54 65 ac 94 f5 e2 02 13 66 |P...U..Te......f|
00000040 8d ff 57 b9 6c e9 6d |..W.l.m|
[8786 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8787 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8140 gate 1578074247774314800 evaluation starts
[8788 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8140 signed by 0 principal evaluation starts (used [false])
[8789 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8140 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[878a 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[878b 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8140 principal evaluation fails
[878c 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8140 gate 1578074247774314800 evaluation fails
[878d 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[878e 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[878f 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8790 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..|
00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|
[8791 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 77 f7 00 ae e1 18 a8 f4 5d 8d |0E.!..w.......].|
00000010 53 81 7b 03 ca a5 00 db b3 f4 32 dd 4c 89 5e a7 |S.{.......2.L.^.|
00000020 f7 40 d6 69 cc 02 20 1f 60 cc 75 6f d2 14 52 ac |.@.i.. .`.uo..R.|
00000030 50 95 e6 a7 55 07 80 54 65 ac 94 f5 e2 02 13 66 |P...U..Te......f|
00000040 8d ff 57 b9 6c e9 6d |..W.l.m|
[8792 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8793 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8a40 gate 1578074247774721900 evaluation starts
[8794 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8a40 signed by 0 principal evaluation starts (used [false])
[8795 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8a40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8796 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8a40 principal evaluation succeeds for identity 0
[8797 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050c8a40 gate 1578074247774721900 evaluation succeeds
[8798 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8799 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[879a 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[879b 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[879c 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:50256
[879d 01-03 17:57:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:50256
[879e 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 3165405727686208509, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes
[879f 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87a0 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 3165405727686208509, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes
[87a1 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[87a2 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87a3 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[87a4 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[87a5 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[87a6 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[87a7 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[87a8 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[87a9 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 03 27 a7 7e 72 c3 a3 93 a1 71 49 5c 86 12 22 |y.'.~r....qI\.."|
00000010 e6 c0 4e 3a d7 3b 84 b8 15 e3 eb a2 e0 ad 81 56 |..N:.;.........V|
[87aa 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 8b d7 c9 22 e1 e2 cf 11 90 13 37 |0D. _..."......7|
00000010 a9 c3 50 8b ae 4e ba 45 94 7b 3a 3b f3 aa 7f 5c |..P..N.E.{:;...\|
00000020 3d a2 85 f2 02 20 1e 28 37 b5 b2 6f c0 29 31 40 |=.... .(7..o.)1@|
00000030 85 b4 40 cc 62 5b 43 e8 1c 94 c6 f7 81 ff 95 f4 |..@.b[C.........|
00000040 1d 92 4d 08 d5 cf |..M...|
[87ab 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[87ac 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dea90 gate 1578074247788368800 evaluation starts
[87ad 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dea90 signed by 0 principal evaluation starts (used [false])
[87ae 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dea90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[87af 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dea90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[87b0 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dea90 principal evaluation fails
[87b1 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dea90 gate 1578074247788368800 evaluation fails
[87b2 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[87b3 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[87b4 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[87b5 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 03 27 a7 7e 72 c3 a3 93 a1 71 49 5c 86 12 22 |y.'.~r....qI\.."|
00000010 e6 c0 4e 3a d7 3b 84 b8 15 e3 eb a2 e0 ad 81 56 |..N:.;.........V|
[87b6 01-03 17:57:27.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 8b d7 c9 22 e1 e2 cf 11 90 13 37 |0D. _..."......7|
00000010 a9 c3 50 8b ae 4e ba 45 94 7b 3a 3b f3 aa 7f 5c |..P..N.E.{:;...\|
00000020 3d a2 85 f2 02 20 1e 28 37 b5 b2 6f c0 29 31 40 |=.... .(7..o.)1@|
00000030 85 b4 40 cc 62 5b 43 e8 1c 94 c6 f7 81 ff 95 f4 |..@.b[C.........|
00000040 1d 92 4d 08 d5 cf |..M...|
[87b7 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[87b8 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050df390 gate 1578074247790451200 evaluation starts
[87b9 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050df390 signed by 0 principal evaluation starts (used [false])
[87ba 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050df390 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[87bb 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050df390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[87bc 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050df390 principal evaluation fails
[87bd 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050df390 gate 1578074247790451200 evaluation fails
[87be 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[87bf 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[87c0 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[87c1 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 03 27 a7 7e 72 c3 a3 93 a1 71 49 5c 86 12 22 |y.'.~r....qI\.."|
00000010 e6 c0 4e 3a d7 3b 84 b8 15 e3 eb a2 e0 ad 81 56 |..N:.;.........V|
[87c2 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 8b d7 c9 22 e1 e2 cf 11 90 13 37 |0D. _..."......7|
00000010 a9 c3 50 8b ae 4e ba 45 94 7b 3a 3b f3 aa 7f 5c |..P..N.E.{:;...\|
00000020 3d a2 85 f2 02 20 1e 28 37 b5 b2 6f c0 29 31 40 |=.... .(7..o.)1@|
00000030 85 b4 40 cc 62 5b 43 e8 1c 94 c6 f7 81 ff 95 f4 |..@.b[C.........|
00000040 1d 92 4d 08 d5 cf |..M...|
[87c3 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[87c4 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dfc90 gate 1578074247792238600 evaluation starts
[87c5 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dfc90 signed by 0 principal evaluation starts (used [false])
[87c6 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[87c7 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[87c8 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:47606
[87c9 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:47606
[87ca 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87cb 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[87cc 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87cd 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[87ce 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87cf 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[87d0 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[87d1 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[87d2 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[87d3 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[87d4 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[87d5 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[87d6 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dfc90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[87d7 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dfc90 principal evaluation succeeds for identity 0
[87d8 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050dfc90 gate 1578074247792238600 evaluation succeeds
[87d9 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[87da 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[87db 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[87dc 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[87dd 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes
[87de 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes]}
[87df 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:97
[87e0 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:97
[87e1 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[87e2 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87e3 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87e4 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87e5 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[87e6 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87e7 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87e8 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87e9 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 3165405727686208509, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers
[87ea 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[87eb 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3165405727686208509, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes
[87ec 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87ed 01-03 17:57:27.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 2f 16 aa 78 89 73 76 06 20 47 |0E.!../..x.sv. G|
00000010 06 d2 4e 94 e6 a3 a6 d2 12 8a 98 90 0a 0a ea 76 |..N............v|
00000020 65 89 b6 60 e6 02 20 00 c9 c1 98 cf 9a 92 8a f1 |e..`.. .........|
00000030 22 ef b9 8a 29 79 97 92 be 37 9a 7b b6 b6 f4 90 |"...)y...7.{....|
00000040 0e 98 04 e8 67 48 20 |....gH |
[87ee 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[87ef 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00510d140 gate 1578074247807150100 evaluation starts
[87f0 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00510d140 signed by 0 principal evaluation starts (used [false])
[87f1 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00510d140 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[87f2 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00510d140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[87f3 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00510d140 principal evaluation fails
[87f4 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00510d140 gate 1578074247807150100 evaluation fails
[87f5 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[87f6 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[87f7 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[87f8 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[87f9 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 2f 16 aa 78 89 73 76 06 20 47 |0E.!../..x.sv. G|
00000010 06 d2 4e 94 e6 a3 a6 d2 12 8a 98 90 0a 0a ea 76 |..N............v|
00000020 65 89 b6 60 e6 02 20 00 c9 c1 98 cf 9a 92 8a f1 |e..`.. .........|
00000030 22 ef b9 8a 29 79 97 92 be 37 9a 7b b6 b6 f4 90 |"...)y...7.{....|
00000040 0e 98 04 e8 67 48 20 |....gH |
[87fa 01-03 17:57:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[87fb 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050f08d0 gate 1578074247816650000 evaluation starts
[87fc 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050f08d0 signed by 0 principal evaluation starts (used [false])
[87fd 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050f08d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[87fe 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050f08d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[87ff 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050f08d0 principal evaluation fails
[8800 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050f08d0 gate 1578074247816650000 evaluation fails
[8801 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8802 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8803 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8804 01-03 17:57:27.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p|
00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|
[8805 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 2f 16 aa 78 89 73 76 06 20 47 |0E.!../..x.sv. G|
00000010 06 d2 4e 94 e6 a3 a6 d2 12 8a 98 90 0a 0a ea 76 |..N............v|
00000020 65 89 b6 60 e6 02 20 00 c9 c1 98 cf 9a 92 8a f1 |e..`.. .........|
00000030 22 ef b9 8a 29 79 97 92 be 37 9a 7b b6 b6 f4 90 |"...)y...7.{....|
00000040 0e 98 04 e8 67 48 20 |....gH |
[8806 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8807 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005124c70 gate 1578074247820541000 evaluation starts
[8808 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005124c70 signed by 0 principal evaluation starts (used [false])
[8809 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005124c70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[880a 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005124c70 principal evaluation succeeds for identity 0
[880b 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005124c70 gate 1578074247820541000 evaluation succeeds
[880c 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[880d 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[880e 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[880f 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8810 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:47606
[8811 01-03 17:57:27.82 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:47606
[8812 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 18220323989342882258, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes
[8813 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8814 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 18220323989342882258, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes
[8815 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[8816 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8817 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8818 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8819 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[881a 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[881b 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[881c 01-03 17:57:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[881d 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d c4 92 91 6e 6e 8d e8 da 89 aa 01 71 21 8f e7 |-...nn......q!..|
00000010 ee 80 f1 e3 13 47 5e 8c 34 17 2e 96 34 b2 1d 39 |.....G^.4...4..9|
[881e 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 9c cc dd 77 4e bf 52 93 8f ec b1 |0D. _...wN.R....|
00000010 29 9a 8f a6 fe 67 6a 5c ed 8f 53 6a 7f de d4 2e |)....gj\..Sj....|
00000020 7e b1 63 bc 02 20 79 cb ff d6 8e e9 a8 28 4b b0 |~.c.. y......(K.|
00000030 64 61 33 ac d5 73 4b de a5 8b 10 5e c2 d8 ec 6b |da3..sK....^...k|
00000040 b4 5b 0a 0a 2b 68 |.[..+h|
[881f 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8820 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150110 gate 1578074247840674600 evaluation starts
[8821 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150110 signed by 0 principal evaluation starts (used [false])
[8822 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150110 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8823 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8824 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150110 principal evaluation fails
[8825 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150110 gate 1578074247840674600 evaluation fails
[8826 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8827 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8828 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8829 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d c4 92 91 6e 6e 8d e8 da 89 aa 01 71 21 8f e7 |-...nn......q!..|
00000010 ee 80 f1 e3 13 47 5e 8c 34 17 2e 96 34 b2 1d 39 |.....G^.4...4..9|
[882a 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 9c cc dd 77 4e bf 52 93 8f ec b1 |0D. _...wN.R....|
00000010 29 9a 8f a6 fe 67 6a 5c ed 8f 53 6a 7f de d4 2e |)....gj\..Sj....|
00000020 7e b1 63 bc 02 20 79 cb ff d6 8e e9 a8 28 4b b0 |~.c.. y......(K.|
00000030 64 61 33 ac d5 73 4b de a5 8b 10 5e c2 d8 ec 6b |da3..sK....^...k|
00000040 b4 5b 0a 0a 2b 68 |.[..+h|
[882b 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[882c 01-03 17:57:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150a10 gate 1578074247849886500 evaluation starts
[882d 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150a10 signed by 0 principal evaluation starts (used [false])
[882e 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150a10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[882f 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8830 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150a10 principal evaluation fails
[8831 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005150a10 gate 1578074247849886500 evaluation fails
[8832 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8833 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8834 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8835 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d c4 92 91 6e 6e 8d e8 da 89 aa 01 71 21 8f e7 |-...nn......q!..|
00000010 ee 80 f1 e3 13 47 5e 8c 34 17 2e 96 34 b2 1d 39 |.....G^.4...4..9|
[8836 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 9c cc dd 77 4e bf 52 93 8f ec b1 |0D. _...wN.R....|
00000010 29 9a 8f a6 fe 67 6a 5c ed 8f 53 6a 7f de d4 2e |)....gj\..Sj....|
00000020 7e b1 63 bc 02 20 79 cb ff d6 8e e9 a8 28 4b b0 |~.c.. y......(K.|
00000030 64 61 33 ac d5 73 4b de a5 8b 10 5e c2 d8 ec 6b |da3..sK....^...k|
00000040 b4 5b 0a 0a 2b 68 |.[..+h|
[8837 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8838 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005125e20 gate 1578074247852578800 evaluation starts
[8839 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005125e20 signed by 0 principal evaluation starts (used [false])
[883a 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005125e20 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[883b 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005125e20 principal evaluation succeeds for identity 0
[883c 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005125e20 gate 1578074247852578800 evaluation succeeds
[883d 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[883e 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[883f 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8840 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8841 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[8842 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes]}
[8843 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:93
[8844 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:93
[8845 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8846 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8847 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8849 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[884a 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[884b 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[884c 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[884d 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 18220323989342882258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers
[884e 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[884f 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 18220323989342882258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes
[8850 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8848 01-03 17:57:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8851 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8852 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8853 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8854 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[8855 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8856 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8857 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8858 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8859 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[885a 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[885b 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[885c 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 96 0c f4 ab 08 56 b7 fe 1f fb f3 39 d5 68 48 |!.....V.....9.hH|
00000010 36 e6 9d 3a bf 04 ba 5d 0e 3a 88 5a d2 3b 90 3f |6..:...].:.Z.;.?|
[885d 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 ce 0e 3f b5 df b5 78 fe 7e 38 a3 |0D. '..?...x.~8.|
00000010 bf 9e e3 d2 0e 56 41 4e e7 ef 3e e1 cb a8 ab 11 |.....VAN..>.....|
00000020 c5 2a c3 ab 02 20 7c 07 70 8e c0 cc f2 95 66 c3 |.*... |.p.....f.|
00000030 c0 16 6e 71 3e 8f 87 70 9c 2b f3 f1 2a 10 08 99 |..nq>..p.+..*...|
00000040 aa c3 b6 fd e3 3e |.....>|
[885e 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[885f 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184390 gate 1578074247975828800 evaluation starts
[8860 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184390 signed by 0 principal evaluation starts (used [false])
[8861 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184390 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8862 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8863 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184390 principal evaluation fails
[8864 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184390 gate 1578074247975828800 evaluation fails
[8865 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8866 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8867 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8868 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 96 0c f4 ab 08 56 b7 fe 1f fb f3 39 d5 68 48 |!.....V.....9.hH|
00000010 36 e6 9d 3a bf 04 ba 5d 0e 3a 88 5a d2 3b 90 3f |6..:...].:.Z.;.?|
[8869 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 ce 0e 3f b5 df b5 78 fe 7e 38 a3 |0D. '..?...x.~8.|
00000010 bf 9e e3 d2 0e 56 41 4e e7 ef 3e e1 cb a8 ab 11 |.....VAN..>.....|
00000020 c5 2a c3 ab 02 20 7c 07 70 8e c0 cc f2 95 66 c3 |.*... |.p.....f.|
00000030 c0 16 6e 71 3e 8f 87 70 9c 2b f3 f1 2a 10 08 99 |..nq>..p.+..*...|
00000040 aa c3 b6 fd e3 3e |.....>|
[886a 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[886b 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184c90 gate 1578074247977308500 evaluation starts
[886c 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184c90 signed by 0 principal evaluation starts (used [false])
[886d 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184c90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[886e 01-03 17:57:27.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[886f 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184c90 principal evaluation fails
[8870 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005184c90 gate 1578074247977308500 evaluation fails
[8871 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8872 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8873 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8874 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 96 0c f4 ab 08 56 b7 fe 1f fb f3 39 d5 68 48 |!.....V.....9.hH|
00000010 36 e6 9d 3a bf 04 ba 5d 0e 3a 88 5a d2 3b 90 3f |6..:...].:.Z.;.?|
[8875 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 ce 0e 3f b5 df b5 78 fe 7e 38 a3 |0D. '..?...x.~8.|
00000010 bf 9e e3 d2 0e 56 41 4e e7 ef 3e e1 cb a8 ab 11 |.....VAN..>.....|
00000020 c5 2a c3 ab 02 20 7c 07 70 8e c0 cc f2 95 66 c3 |.*... |.p.....f.|
00000030 c0 16 6e 71 3e 8f 87 70 9c 2b f3 f1 2a 10 08 99 |..nq>..p.+..*...|
00000040 aa c3 b6 fd e3 3e |.....>|
[8876 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8877 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005185590 gate 1578074247981863600 evaluation starts
[8878 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005185590 signed by 0 principal evaluation starts (used [false])
[8879 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005185590 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[887a 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005185590 principal evaluation succeeds for identity 0
[887b 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005185590 gate 1578074247981863600 evaluation succeeds
[887c 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[887d 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[887e 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[887f 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8880 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8881 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes]}
[8882 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94
[8883 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94
[8884 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8885 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8886 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8887 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8888 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8889 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[888a 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[888b 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[888c 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[888d 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[888e 01-03 17:57:27.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[888f 01-03 17:57:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8890 01-03 17:57:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8891 01-03 17:57:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8892 01-03 17:57:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8893 01-03 17:57:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8894 01-03 17:57:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8895 01-03 17:57:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[8896 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[8897 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[8898 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 <nil>}] <nil>}
[8899 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[889a 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0051d2f70, CONNECTING
[889b 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[889c 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[889d 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[889e 01-03 17:57:28.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[889f 01-03 17:57:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0051d2f70, READY
[88a0 01-03 17:57:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21
[88a1 01-03 17:57:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE
[88a2 01-03 17:57:28.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" tls_cert_hash:"\001)X\236\356\300L.5\244\301\243 \236O\257\312\033\365V\224\377;{~\231\005\030\242a\036!" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051
[88a3 01-03 17:57:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051
[88a4 01-03 17:57:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[|
00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|
[88a5 01-03 17:57:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 a4 9a 49 5a 54 6d bd 0c 2a 2c 18 |0D. e..IZTm..*,.|
00000010 a2 f0 18 ec c0 3a b2 a1 10 e1 90 e7 25 fd 26 6c |.....:......%.&l|
00000020 b3 40 35 af 02 20 76 91 5d 03 81 59 9b d0 d1 a2 |.@5.. v.]..Y....|
00000030 e7 d9 17 d6 c5 33 d3 c3 1c 6f fe 55 c8 c8 e5 bb |.....3...o.U....|
00000040 73 04 8d e3 00 2a |s....*|
[88a6 01-03 17:57:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051
[88a7 01-03 17:57:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88a8 01-03 17:57:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[88a9 01-03 17:57:28.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88aa 01-03 17:57:28.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[88ab 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[88ac 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88ad 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[88ae 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[88af 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88b0 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[88b1 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[88b2 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[88b3 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[88b4 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[88b5 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[88b6 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 0f 2d 4a ce 27 f2 b1 f9 8f d7 2e a9 13 14 2a |..-J.'.........*|
00000010 b7 17 66 0d 2e 2a b4 93 8d 33 ec 8c 36 1f d4 49 |..f..*...3..6..I|
[88b7 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 7e 0a d2 75 d2 71 4a f4 65 cd |0E.!..~..u.qJ.e.|
00000010 30 b0 84 dd f4 61 de 93 e7 35 8f 06 b5 09 6a a9 |0....a...5....j.|
00000020 af d9 04 4a a8 02 20 57 8e 99 dc 7c 99 b4 82 f1 |...J.. W...|....|
00000030 4c 3c c6 ff 84 77 c8 2c 02 b4 3d 4a d4 8b 90 aa |L<...w.,..=J....|
00000040 37 e9 d9 b2 f8 02 ca |7......|
[88b8 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[88b9 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052303c0 gate 1578074248104351300 evaluation starts
[88ba 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052303c0 signed by 0 principal evaluation starts (used [false])
[88bb 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052303c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[88bc 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052303c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[88bd 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052303c0 principal evaluation fails
[88be 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052303c0 gate 1578074248104351300 evaluation fails
[88bf 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[88c0 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[88c1 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[88c2 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 0f 2d 4a ce 27 f2 b1 f9 8f d7 2e a9 13 14 2a |..-J.'.........*|
00000010 b7 17 66 0d 2e 2a b4 93 8d 33 ec 8c 36 1f d4 49 |..f..*...3..6..I|
[88c3 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 7e 0a d2 75 d2 71 4a f4 65 cd |0E.!..~..u.qJ.e.|
00000010 30 b0 84 dd f4 61 de 93 e7 35 8f 06 b5 09 6a a9 |0....a...5....j.|
00000020 af d9 04 4a a8 02 20 57 8e 99 dc 7c 99 b4 82 f1 |...J.. W...|....|
00000030 4c 3c c6 ff 84 77 c8 2c 02 b4 3d 4a d4 8b 90 aa |L<...w.,..=J....|
00000040 37 e9 d9 b2 f8 02 ca |7......|
[88c4 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[88c5 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005230cc0 gate 1578074248107912100 evaluation starts
[88c6 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005230cc0 signed by 0 principal evaluation starts (used [false])
[88c7 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005230cc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[88c8 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005230cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[88c9 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005230cc0 principal evaluation fails
[88ca 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005230cc0 gate 1578074248107912100 evaluation fails
[88cb 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[88cc 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[88cd 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[88ce 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 0f 2d 4a ce 27 f2 b1 f9 8f d7 2e a9 13 14 2a |..-J.'.........*|
00000010 b7 17 66 0d 2e 2a b4 93 8d 33 ec 8c 36 1f d4 49 |..f..*...3..6..I|
[88cf 01-03 17:57:28.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 7e 0a d2 75 d2 71 4a f4 65 cd |0E.!..~..u.qJ.e.|
00000010 30 b0 84 dd f4 61 de 93 e7 35 8f 06 b5 09 6a a9 |0....a...5....j.|
00000020 af d9 04 4a a8 02 20 57 8e 99 dc 7c 99 b4 82 f1 |...J.. W...|....|
00000030 4c 3c c6 ff 84 77 c8 2c 02 b4 3d 4a d4 8b 90 aa |L<...w.,..=J....|
00000040 37 e9 d9 b2 f8 02 ca |7......|
[88d0 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[88d1 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052315c0 gate 1578074248110630400 evaluation starts
[88d2 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052315c0 signed by 0 principal evaluation starts (used [false])
[88d3 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052315c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[88d4 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052315c0 principal evaluation succeeds for identity 0
[88d5 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052315c0 gate 1578074248110630400 evaluation succeeds
[88d6 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[88d7 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[88d8 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[88d9 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[88da 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[88db 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes]}
[88dc 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98
[88dd 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98
[88de 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[88df 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88e0 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88e1 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88e2 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e3 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e4 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e5 01-03 17:57:28.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e6 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e7 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e8 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[88e9 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88ea 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88eb 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[88ec 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[88ed 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88ee 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[88ef 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88f0 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[88f1 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88f2 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[88f3 01-03 17:57:28.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88f4 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315105D
[88f5 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 547B553DF8F1548799C00E519118161477C9509EC74A9D0990D29A9085239104
[88f6 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[88f7 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[88f8 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[88f9 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88fa 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88fb 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88fc 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[88fd 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88fe 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[88ff 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8900 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8901 01-03 17:57:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[8902 01-03 17:57:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8903 01-03 17:57:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8904 01-03 17:57:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[8905 01-03 17:57:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8906 01-03 17:57:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[8907 01-03 17:57:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8908 01-03 17:57:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[8909 01-03 17:57:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[890a 01-03 17:57:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 7b 55 3d f8 f1 54 87 99 c0 0e 51 91 18 16 14 |T{U=..T....Q....|
00000010 77 c9 50 9e c7 4a 9d 09 90 d2 9a 90 85 23 91 04 |w.P..J.......#..|
[890b 01-03 17:57:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 63 01 97 57 b0 e7 79 55 00 1f |0E.!..c..W..yU..|
00000010 90 b4 24 2f 5f 91 1a ff 12 9f 46 c3 75 b9 44 ae |..$/_.....F.u.D.|
00000020 70 f0 fe fe a0 02 20 6e fd ac f0 73 44 10 fc 26 |p..... n...sD..&|
00000030 a2 90 e1 68 bc 12 bd 10 d8 ea b5 bd 68 d4 f9 c6 |...h........h...|
00000040 43 66 0e 6c 01 2d bd |Cf.l.-.|
[890c 01-03 17:57:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[890d 01-03 17:57:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[890e 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:14119584914909020458 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[890f 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14119584914909020458 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8910 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8911 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8912 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8913 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8914 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8915 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8916 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[8917 01-03 17:57:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8918 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:14922478491536064448 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8919 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14922478491536064448 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[891a 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[891b 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[891c 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[891d 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[891e 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[891f 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8920 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[8921 01-03 17:57:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8922 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8923 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8924 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8925 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[8926 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8927 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8928 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8929 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[892a 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[892b 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[892c 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[892d 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 67 1d 70 a8 da 99 e9 08 58 ac 39 63 7c e4 01 |.g.p.....X.9c|..|
00000010 54 a8 6a 2c 4a 07 6f 4c 71 66 e7 ca 6c 8a a0 2d |T.j,J.oLqf..l..-|
[892e 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 53 af 8b 71 6d b7 3e ac d7 83 1c |0D. vS..qm.>....|
00000010 86 f7 59 fb d3 7c 1f d1 f2 63 f2 8a ed b9 85 71 |..Y..|...c.....q|
00000020 c2 05 fe 20 02 20 21 34 21 f5 53 cc 44 cf de 93 |... . !4!.S.D...|
00000030 d7 f7 8c d0 7c 93 0a cf e8 71 e2 99 db 69 0b 0e |....|....q...i..|
00000040 4b 64 20 b8 8b 51 |Kd ..Q|
[892f 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8930 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528cf40 gate 1578074249166566100 evaluation starts
[8931 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528cf40 signed by 0 principal evaluation starts (used [false])
[8932 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528cf40 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8933 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528cf40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8934 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528cf40 principal evaluation fails
[8935 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528cf40 gate 1578074249166566100 evaluation fails
[8936 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8937 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8938 01-03 17:57:29.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8939 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 67 1d 70 a8 da 99 e9 08 58 ac 39 63 7c e4 01 |.g.p.....X.9c|..|
00000010 54 a8 6a 2c 4a 07 6f 4c 71 66 e7 ca 6c 8a a0 2d |T.j,J.oLqf..l..-|
[893a 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 53 af 8b 71 6d b7 3e ac d7 83 1c |0D. vS..qm.>....|
00000010 86 f7 59 fb d3 7c 1f d1 f2 63 f2 8a ed b9 85 71 |..Y..|...c.....q|
00000020 c2 05 fe 20 02 20 21 34 21 f5 53 cc 44 cf de 93 |... . !4!.S.D...|
00000030 d7 f7 8c d0 7c 93 0a cf e8 71 e2 99 db 69 0b 0e |....|....q...i..|
00000040 4b 64 20 b8 8b 51 |Kd ..Q|
[893b 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[893c 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528d840 gate 1578074249171831100 evaluation starts
[893d 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528d840 signed by 0 principal evaluation starts (used [false])
[893e 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528d840 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[893f 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528d840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8940 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528d840 principal evaluation fails
[8941 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00528d840 gate 1578074249171831100 evaluation fails
[8942 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8943 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8944 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8945 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 67 1d 70 a8 da 99 e9 08 58 ac 39 63 7c e4 01 |.g.p.....X.9c|..|
00000010 54 a8 6a 2c 4a 07 6f 4c 71 66 e7 ca 6c 8a a0 2d |T.j,J.oLqf..l..-|
[8946 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 53 af 8b 71 6d b7 3e ac d7 83 1c |0D. vS..qm.>....|
00000010 86 f7 59 fb d3 7c 1f d1 f2 63 f2 8a ed b9 85 71 |..Y..|...c.....q|
00000020 c2 05 fe 20 02 20 21 34 21 f5 53 cc 44 cf de 93 |... . !4!.S.D...|
00000030 d7 f7 8c d0 7c 93 0a cf e8 71 e2 99 db 69 0b 0e |....|....q...i..|
00000040 4b 64 20 b8 8b 51 |Kd ..Q|
[8947 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8948 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a2140 gate 1578074249175559200 evaluation starts
[8949 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a2140 signed by 0 principal evaluation starts (used [false])
[894a 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a2140 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[894b 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a2140 principal evaluation succeeds for identity 0
[894c 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a2140 gate 1578074249175559200 evaluation succeeds
[894d 01-03 17:57:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[894e 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[894f 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8950 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8951 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes
[8952 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes]}
[8953 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:99
[8954 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:99
[8955 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[8956 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8957 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8958 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8959 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[895a 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[895b 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[895c 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[895d 01-03 17:57:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[895e 01-03 17:57:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[895f 01-03 17:57:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8960 01-03 17:57:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8961 01-03 17:57:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[8962 01-03 17:57:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8963 01-03 17:57:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[8964 01-03 17:57:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[8965 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8966 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8967 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8968 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8969 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[896a 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[896b 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[896c 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b3 f2 5f e9 88 6b b8 d7 dd 18 d6 47 d3 62 bc |..._..k.....G.b.|
00000010 16 9c 4a 8f 57 73 81 a1 1e ed 00 0b 9c a4 55 ed |..J.Ws........U.|
[896d 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 bf 07 eb bb c9 b0 6c 91 a6 f3 |0E.!........l...|
00000010 ef 13 67 fe d4 50 bf d8 6c 89 dd 04 8c fb aa 2c |..g..P..l......,|
00000020 c9 09 8c 47 ad 02 20 60 02 d3 a6 4f ce 72 9a 21 |...G.. `...O.r.!|
00000030 5e ae b2 ca a5 cc d1 5b 83 4e 0c 31 83 a0 4f 90 |^......[.N.1..O.|
00000040 f8 1a c1 fd d8 be d1 |.......|
[896e 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[896f 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be3c0 gate 1578074249224225200 evaluation starts
[8970 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be3c0 signed by 0 principal evaluation starts (used [false])
[8971 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be3c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8972 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8973 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be3c0 principal evaluation fails
[8974 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be3c0 gate 1578074249224225200 evaluation fails
[8975 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8976 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8977 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8978 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b3 f2 5f e9 88 6b b8 d7 dd 18 d6 47 d3 62 bc |..._..k.....G.b.|
00000010 16 9c 4a 8f 57 73 81 a1 1e ed 00 0b 9c a4 55 ed |..J.Ws........U.|
[8979 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 bf 07 eb bb c9 b0 6c 91 a6 f3 |0E.!........l...|
00000010 ef 13 67 fe d4 50 bf d8 6c 89 dd 04 8c fb aa 2c |..g..P..l......,|
00000020 c9 09 8c 47 ad 02 20 60 02 d3 a6 4f ce 72 9a 21 |...G.. `...O.r.!|
00000030 5e ae b2 ca a5 cc d1 5b 83 4e 0c 31 83 a0 4f 90 |^......[.N.1..O.|
00000040 f8 1a c1 fd d8 be d1 |.......|
[897a 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[897b 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052becc0 gate 1578074249227353000 evaluation starts
[897c 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052becc0 signed by 0 principal evaluation starts (used [false])
[897d 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052becc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[897e 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052becc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[897f 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052becc0 principal evaluation fails
[8980 01-03 17:57:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052becc0 gate 1578074249227353000 evaluation fails
[8981 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8982 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8983 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8984 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b3 f2 5f e9 88 6b b8 d7 dd 18 d6 47 d3 62 bc |..._..k.....G.b.|
00000010 16 9c 4a 8f 57 73 81 a1 1e ed 00 0b 9c a4 55 ed |..J.Ws........U.|
[8985 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 bf 07 eb bb c9 b0 6c 91 a6 f3 |0E.!........l...|
00000010 ef 13 67 fe d4 50 bf d8 6c 89 dd 04 8c fb aa 2c |..g..P..l......,|
00000020 c9 09 8c 47 ad 02 20 60 02 d3 a6 4f ce 72 9a 21 |...G.. `...O.r.!|
00000030 5e ae b2 ca a5 cc d1 5b 83 4e 0c 31 83 a0 4f 90 |^......[.N.1..O.|
00000040 f8 1a c1 fd d8 be d1 |.......|
[8986 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8987 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052bf5c0 gate 1578074249233507100 evaluation starts
[8988 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052bf5c0 signed by 0 principal evaluation starts (used [false])
[8989 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052bf5c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[898a 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052bf5c0 principal evaluation succeeds for identity 0
[898b 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052bf5c0 gate 1578074249233507100 evaluation succeeds
[898c 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[898d 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[898e 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[898f 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8990 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes
[8991 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes]}
[8992 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:95
[8993 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:95
[8994 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8995 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8996 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8997 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8998 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[8999 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[899a 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[899b 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[899c 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[899d 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[899e 01-03 17:57:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[899f 01-03 17:57:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[89a0 01-03 17:57:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[89a1 01-03 17:57:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:213534934262742834 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[89a2 01-03 17:57:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[89a3 01-03 17:57:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4231152719724278159 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[89a4 01-03 17:57:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[89a5 01-03 17:57:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12353884135913132157 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[89a6 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12353884135913132157 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[89a7 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89a8 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:213534934262742834 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[89a9 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89aa 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4231152719724278159 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[89ab 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89ac 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 213534934262742834 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[89ad 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 213534934262742834 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[89ae 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89af 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4231152719724278159 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[89b0 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4231152719724278159 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[89b1 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4231152719724278159 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[89b2 01-03 17:57:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89b3 01-03 17:57:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12353884135913132157 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[89b4 01-03 17:57:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12353884135913132157 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[89b5 01-03 17:57:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89b6 01-03 17:57:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89b7 01-03 17:57:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89b8 01-03 17:57:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[89b9 01-03 17:57:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[89ba 01-03 17:57:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[89bb 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89bc 01-03 17:57:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89bd 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[89be 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89bf 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[89c0 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[89c1 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[89c2 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[89c3 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89c4 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89c5 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[89c6 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[89c7 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[89c8 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[89c9 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[89ca 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[89cb 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[89cc 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[89cd 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[89ce 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005306f50 gate 1578074249346188300 evaluation starts
[89cf 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005306f50 signed by 0 principal evaluation starts (used [false])
[89d0 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005306f50 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[89d1 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005306f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[89d2 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005306f50 principal evaluation fails
[89d3 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005306f50 gate 1578074249346188300 evaluation fails
[89d4 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[89d5 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[89d6 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[89d7 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[89d8 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[89d9 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[89da 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005307850 gate 1578074249348342600 evaluation starts
[89db 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005307850 signed by 0 principal evaluation starts (used [false])
[89dc 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005307850 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[89dd 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005307850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[89de 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005307850 principal evaluation fails
[89df 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005307850 gate 1578074249348342600 evaluation fails
[89e0 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[89e1 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[89e2 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[89e3 01-03 17:57:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[89e4 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[89e5 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[89e6 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e150 gate 1578074249351231400 evaluation starts
[89e7 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e150 signed by 0 principal evaluation starts (used [false])
[89e8 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e150 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[89e9 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e150 principal evaluation succeeds for identity 0
[89ea 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e150 gate 1578074249351231400 evaluation succeeds
[89eb 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[89ec 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[89ed 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[89ee 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[89ef 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89f0 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89f1 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[89f2 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[89f3 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[89f4 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[89f5 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[89f7 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[89f6 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89f8 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89f9 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074247535951700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes to 3 peers
[89fa 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89fb 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89fc 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074247535951700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[89fd 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89fe 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074247535951700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[8a00 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89ff 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085546330000 seq_num:1578074247535951700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[8a01 01-03 17:57:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a02 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8a03 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8a04 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a05 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531fbb0 gate 1578074249374347300 evaluation starts
[8a06 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531fbb0 signed by 0 principal evaluation starts (used [false])
[8a07 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531fbb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8a08 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531fbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8a09 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531fbb0 principal evaluation fails
[8a0a 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531fbb0 gate 1578074249374347300 evaluation fails
[8a0b 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8a0c 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8a0d 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8a0e 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8a0f 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8a10 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a11 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533a4b0 gate 1578074249378944900 evaluation starts
[8a12 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533a4b0 signed by 0 principal evaluation starts (used [false])
[8a13 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533a4b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8a14 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533a4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8a15 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533a4b0 principal evaluation fails
[8a16 01-03 17:57:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533a4b0 gate 1578074249378944900 evaluation fails
[8a17 01-03 17:57:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8a18 01-03 17:57:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8a19 01-03 17:57:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8a1a 01-03 17:57:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8a1b 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8a1c 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a1d 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533adb0 gate 1578074249392576000 evaluation starts
[8a1e 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533adb0 signed by 0 principal evaluation starts (used [false])
[8a1f 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533adb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8a20 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533adb0 principal evaluation succeeds for identity 0
[8a21 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00533adb0 gate 1578074249392576000 evaluation succeeds
[8a22 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8a23 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8a24 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8a25 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8a26 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8a27 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8a28 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8a29 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8a2a 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8a2b 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8a2c 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8a2d 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a2e 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI
F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX
LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E
AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du
NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==
-----END CERTIFICATE-----
[8a2f 01-03 17:57:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8a30 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8a31 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315105E
[8a32 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6F55170F1D59B2B966443294329038A77C136C7B191D304A373E77E18FE560E8
[8a33 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8a34 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8a35 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[8a36 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a37 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[8a38 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a39 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[8a3a 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[8a3b 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a3c 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[8a3d 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a3e 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[8a3f 01-03 17:57:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a40 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[8a41 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a42 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005354120 gate 1578074249423806300 evaluation starts
[8a43 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005354120 signed by 0 principal evaluation starts (used [false])
[8a44 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005354120 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[8a45 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005354120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)
[8a46 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005354120 principal evaluation fails
[8a47 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005354120 gate 1578074249423806300 evaluation fails
[8a48 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8a49 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8a4a 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8a4b 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8a4c 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8a4d 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a4e 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005355300 gate 1578074249428556000 evaluation starts
[8a4f 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005355300 signed by 0 principal evaluation starts (used [false])
[8a50 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005355300 processing identity 0 - &{Org1MSP d1479166982f32bde2936c88cd927f80d7f0874e6baf64333d42d8919abdc1f2}
[8a51 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[8a52 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[8a53 01-03 17:57:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[8a54 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005355300 principal evaluation succeeds for identity 0
[8a55 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005355300 gate 1578074249428556000 evaluation succeeds
[8a56 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[8a57 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8a58 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8a59 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8a5a 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a5b 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 771 bytes, Signature: 0 bytes
[8a5c 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a5d 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[8a5e 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[8a5f 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[8a60 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[8a61 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a62 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a63 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8a64 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8a65 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8a66 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8a67 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8a68 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8a69 01-03 17:57:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8a6a 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8a6b 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a6c 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396060 gate 1578074249441667300 evaluation starts
[8a6d 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396060 signed by 0 principal evaluation starts (used [false])
[8a6e 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396060 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8a6f 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8a70 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396060 principal evaluation fails
[8a71 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396060 gate 1578074249441667300 evaluation fails
[8a72 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8a73 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8a74 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8a75 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8a76 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8a77 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a78 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396960 gate 1578074249446841600 evaluation starts
[8a79 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396960 signed by 0 principal evaluation starts (used [false])
[8a7a 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396960 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8a7b 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8a7c 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396960 principal evaluation fails
[8a7d 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005396960 gate 1578074249446841600 evaluation fails
[8a7e 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8a7f 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8a80 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8a81 01-03 17:57:29.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 78 7d af bc 91 72 dc 95 c0 83 7c c6 3e 21 d5 |.x}...r....|.>!.|
00000010 5d e1 97 e6 d5 72 6f a6 65 e6 54 3e ee a0 9e 68 |]....ro.e.T>...h|
[8a82 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 fb bc 67 62 91 08 87 bf b5 44 1a |0D. ...gb.....D.|
00000010 e9 62 33 3a fc 77 e0 fb a0 01 07 76 e8 ee 56 3a |.b3:.w.....v..V:|
00000020 9f fa ce f4 02 20 10 4f 53 d0 b9 bd c4 50 33 81 |..... .OS....P3.|
00000030 1a b6 ff 72 00 0f 06 72 f3 b3 d3 b7 a9 99 e9 42 |...r...r.......B|
00000040 51 a5 c9 62 f5 a5 |Q..b..|
[8a83 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a84 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005397260 gate 1578074249451224200 evaluation starts
[8a85 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005397260 signed by 0 principal evaluation starts (used [false])
[8a86 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005397260 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8a87 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005397260 principal evaluation succeeds for identity 0
[8a88 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005397260 gate 1578074249451224200 evaluation succeeds
[8a89 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8a8a 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8a8b 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8a8c 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8a8d 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a8e 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a8f 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8a90 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8a91 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8a92 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8a93 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8a94 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8a95 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8a96 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8a97 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a98 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b0cc0 gate 1578074249457539800 evaluation starts
[8a99 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b0cc0 signed by 0 principal evaluation starts (used [false])
[8a9a 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b0cc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8a9b 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b0cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8a9c 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b0cc0 principal evaluation fails
[8a9d 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b0cc0 gate 1578074249457539800 evaluation fails
[8a9e 01-03 17:57:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8a9f 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8aa0 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8aa1 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8aa2 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8aa3 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8aa4 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b15c0 gate 1578074249462950900 evaluation starts
[8aa5 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b15c0 signed by 0 principal evaluation starts (used [false])
[8aa6 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b15c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8aa7 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b15c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8aa8 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b15c0 principal evaluation fails
[8aa9 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053b15c0 gate 1578074249462950900 evaluation fails
[8aaa 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8aab 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8aac 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8aad 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8aae 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8aaf 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ab0 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00535f2d0 gate 1578074249469524100 evaluation starts
[8ab1 01-03 17:57:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00535f2d0 signed by 0 principal evaluation starts (used [false])
[8ab2 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00535f2d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8ab3 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00535f2d0 principal evaluation succeeds for identity 0
[8ab4 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00535f2d0 gate 1578074249469524100 evaluation succeeds
[8ab5 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8ab6 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8ab7 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8ab8 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8ab9 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8aba 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8abb 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8abc 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8abd 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8abe 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8abf 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8ac0 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8ac1 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ac2 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4060 gate 1578074249475484300 evaluation starts
[8ac3 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4060 signed by 0 principal evaluation starts (used [false])
[8ac4 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4060 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8ac5 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8ac6 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4060 principal evaluation fails
[8ac7 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4060 gate 1578074249475484300 evaluation fails
[8ac8 01-03 17:57:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8ac9 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8aca 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8acb 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8acc 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8acd 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ace 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4960 gate 1578074249484024400 evaluation starts
[8acf 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4960 signed by 0 principal evaluation starts (used [false])
[8ad0 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4960 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8ad1 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8ad2 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4960 principal evaluation fails
[8ad3 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d4960 gate 1578074249484024400 evaluation fails
[8ad4 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8ad5 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8ad6 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8ad7 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8ad8 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8ad9 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ada 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d5260 gate 1578074249486965000 evaluation starts
[8adb 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d5260 signed by 0 principal evaluation starts (used [false])
[8adc 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d5260 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8add 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d5260 principal evaluation succeeds for identity 0
[8ade 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d5260 gate 1578074249486965000 evaluation succeeds
[8adf 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8ae0 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8ae1 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8ae2 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8ae3 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ae4 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[8ae5 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ae6 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 67 05 eb c7 e1 39 4e 8c 1b 1e cd 6c be 45 7e |.g....9N....l.E~|
00000010 fc 71 8b 04 a6 60 8e 5e 93 55 6d 4e f7 a4 22 38 |.q...`.^.UmN.."8|
[8ae7 01-03 17:57:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a9 e7 bb 92 d0 11 78 f6 0a b5 da |0D. '......x....|
00000010 81 22 2f 86 bf 31 99 64 f6 38 5b 06 ee 76 2a 67 |."/..1.d.8[..v*g|
00000020 6d 24 df 2a 02 20 43 06 72 ad 37 b3 b1 50 40 5a |m$.*. C.r.7..P@Z|
00000030 33 8d 64 e2 cc c0 09 07 40 d2 ec 2a 50 2d 39 20 |3.d.....@..*P-9 |
00000040 ae d9 a4 6a 3b 34 |...j;4|
[8ae8 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 35 d7 21 85 c0 cf 1c 7c 71 d9 4b 97 3b a1 5f |x5.!....|q.K.;._|
00000010 db 08 0c 43 07 24 9c 1b ce 34 f1 0e 16 b7 bf 48 |...C.$...4.....H|
[8ae9 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 41 11 56 48 0f 84 c1 e3 6a 0a f2 |0D. .A.VH....j..|
00000010 90 0f 9b b5 fd b0 ff fb ed 8b ba 64 2f fa 96 29 |...........d/..)|
00000020 67 f7 1c 15 02 20 39 09 42 45 e1 b7 6a 95 73 3a |g.... 9.BE..j.s:|
00000030 ec 4e 22 23 6e 6f 9b d1 81 84 fb 7a 5b 60 42 43 |.N"#no.....z[`BC|
00000040 1f 13 bc b0 ad c7 |......|
[8aea 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8aeb 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8aec 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8aed 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8aee 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8aef 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8af0 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8af1 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8af2 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8af3 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8af4 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8af5 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053efcd0 gate 1578074249492913300 evaluation starts
[8af6 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053efcd0 signed by 0 principal evaluation starts (used [false])
[8af7 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053efcd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8af8 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053efcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8af9 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053efcd0 principal evaluation fails
[8afa 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053efcd0 gate 1578074249492913300 evaluation fails
[8afb 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8afc 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8afd 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8afe 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8aff 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8b00 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b01 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054065d0 gate 1578074249495122300 evaluation starts
[8b02 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054065d0 signed by 0 principal evaluation starts (used [false])
[8b03 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054065d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8b04 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054065d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8b05 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054065d0 principal evaluation fails
[8b06 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054065d0 gate 1578074249495122300 evaluation fails
[8b07 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8b08 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8b09 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8b0a 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 f0 97 f6 47 23 9c e2 62 98 f3 61 5a 4c 10 f9 |....G#..b..aZL..|
00000010 23 87 7d 44 6c 48 99 f5 d0 86 13 84 52 76 63 4d |#.}DlH......RvcM|
[8b0b 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fa a2 c6 e0 c6 ea 9d 43 5a 5c 63 |0D. S.......CZ\c|
00000010 7b 91 61 3f b7 f8 e6 5d 24 7c 6d e5 30 49 3a cc |{.a?...]$|m.0I:.|
00000020 9e e0 a5 39 02 20 1c 6a f6 4d 3a 06 d1 31 c7 3d |...9. .j.M:..1.=|
00000030 30 ba 2e 55 b6 87 91 42 7c 64 14 ec 2c c5 82 6c |0..U...B|d..,..l|
00000040 0a 4b 46 8e 4e 73 |.KF.Ns|
[8b0c 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b0d 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005406ed0 gate 1578074249497233900 evaluation starts
[8b0e 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005406ed0 signed by 0 principal evaluation starts (used [false])
[8b0f 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005406ed0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8b10 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005406ed0 principal evaluation succeeds for identity 0
[8b11 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005406ed0 gate 1578074249497233900 evaluation succeeds
[8b12 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8b13 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8b14 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8b15 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8b16 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b17 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b18 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8b19 01-03 17:57:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8b1a 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8b1b 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8b1c 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8b1d 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8b1e 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8b1f 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8b20 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b21 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005426930 gate 1578074249501332200 evaluation starts
[8b22 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005426930 signed by 0 principal evaluation starts (used [false])
[8b23 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005426930 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8b24 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005426930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8b25 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005426930 principal evaluation fails
[8b26 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005426930 gate 1578074249501332200 evaluation fails
[8b27 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8b28 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8b29 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8b2a 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8b2b 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8b2c 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b2d 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427230 gate 1578074249503672700 evaluation starts
[8b2e 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427230 signed by 0 principal evaluation starts (used [false])
[8b2f 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427230 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8b30 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8b31 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427230 principal evaluation fails
[8b32 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427230 gate 1578074249503672700 evaluation fails
[8b33 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8b34 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8b35 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8b36 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8b37 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8b38 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b39 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427b30 gate 1578074249506095400 evaluation starts
[8b3a 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427b30 signed by 0 principal evaluation starts (used [false])
[8b3b 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427b30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8b3c 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427b30 principal evaluation succeeds for identity 0
[8b3d 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005427b30 gate 1578074249506095400 evaluation succeeds
[8b3e 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8b3f 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8b40 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8b41 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8b42 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b43 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8b44 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8b45 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8b46 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8b47 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8b48 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8b49 01-03 17:57:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8b4a 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b4b 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543a8c0 gate 1578074249510588300 evaluation starts
[8b4c 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543a8c0 signed by 0 principal evaluation starts (used [false])
[8b4d 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543a8c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8b4e 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543a8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8b4f 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543a8c0 principal evaluation fails
[8b50 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543a8c0 gate 1578074249510588300 evaluation fails
[8b51 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8b52 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8b53 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8b54 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8b55 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8b56 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b57 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543b1c0 gate 1578074249513721100 evaluation starts
[8b58 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543b1c0 signed by 0 principal evaluation starts (used [false])
[8b59 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543b1c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8b5a 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543b1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8b5b 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543b1c0 principal evaluation fails
[8b5c 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543b1c0 gate 1578074249513721100 evaluation fails
[8b5d 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8b5e 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8b5f 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8b60 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8b61 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8b62 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b63 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543bac0 gate 1578074249516194100 evaluation starts
[8b64 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543bac0 signed by 0 principal evaluation starts (used [false])
[8b65 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543bac0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8b66 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543bac0 principal evaluation succeeds for identity 0
[8b67 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00543bac0 gate 1578074249516194100 evaluation succeeds
[8b68 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8b69 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8b6a 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8b6b 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8b6c 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b6d 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[8b6e 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b70 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[8b6f 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[8b71 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[8b72 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 55 17 0f 1d 59 b2 b9 66 44 32 94 32 90 38 a7 |oU...Y..fD2.2.8.|
00000010 7c 13 6c 7b 19 1d 30 4a 37 3e 77 e1 8f e5 60 e8 ||.l{..0J7>w...`.|
[8b73 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 6e 93 29 18 cd 42 0c 9c 0f 3b |0E.!..n.)..B...;|
00000010 84 09 71 d2 a1 46 ed 38 24 d0 b8 53 7b 8a 73 99 |..q..F.8$..S{.s.|
00000020 39 4a ad da 3e 02 20 66 6c f0 6b c1 64 60 04 5a |9J..>. fl.k.d`.Z|
00000030 61 dd 5e 34 45 62 9e 8f 14 9a c8 c8 ec ce 12 eb |a.^4Eb..........|
00000040 2b 84 28 25 08 b2 19 |+.(%...|
[8b74 01-03 17:57:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[8b75 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 95 bb 8f 73 cf 5a f6 03 0d 80 |0E.!.....s.Z....|
00000010 72 c1 3c d8 c3 96 6f 17 3c 23 b9 7f de 25 1d 6c |r.<...o.<#...%.l|
00000020 39 fd 85 b9 38 02 20 01 c4 ef c9 95 6d ad 31 f9 |9...8. .....m.1.|
00000030 f0 e4 4c 46 93 93 58 20 b6 98 1e 58 d2 af 28 92 |..LF..X ...X..(.|
00000040 1f b7 d1 14 cb 9e 90 |.......|
[8b76 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8b77 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8b78 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b79 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b7a 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[8b7b 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b7c 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[8b7d 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[8b7e 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 55 17 0f 1d 59 b2 b9 66 44 32 94 32 90 38 a7 |oU...Y..fD2.2.8.|
00000010 7c 13 6c 7b 19 1d 30 4a 37 3e 77 e1 8f e5 60 e8 ||.l{..0J7>w...`.|
[8b7f 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 6e 93 29 18 cd 42 0c 9c 0f 3b |0E.!..n.)..B...;|
00000010 84 09 71 d2 a1 46 ed 38 24 d0 b8 53 7b 8a 73 99 |..q..F.8$..S{.s.|
00000020 39 4a ad da 3e 02 20 66 6c f0 6b c1 64 60 04 5a |9J..>. fl.k.d`.Z|
00000030 61 dd 5e 34 45 62 9e 8f 14 9a c8 c8 ec ce 12 eb |a.^4Eb..........|
00000040 2b 84 28 25 08 b2 19 |+.(%...|
[8b80 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes
[8b81 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes
[8b82 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b83 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8b84 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 8c b9 db dd da ea ee de ca 20 26 6b 53 b7 69 |.......... &kS.i|
00000010 fa 3b f0 2b a4 64 70 6c 5b a9 1e 19 7b 7c a9 90 |.;.+.dpl[...{|..|
[8b85 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 37 25 15 e1 a9 12 2e d4 6a e8 32 |0D. j7%......j.2|
00000010 10 1e 94 e4 2d b3 b8 c6 9a 75 47 3f 7e 39 17 8a |....-....uG?~9..|
00000020 a5 bb 9b 4d 02 20 4b 22 07 6b 97 de 5a 5c 65 d0 |...M. K".k..Z\e.|
00000030 5c 45 09 7d d3 b3 e7 ee 67 4f e3 be ff c0 3a 3d |\E.}....gO....:=|
00000040 f5 3f 02 36 ff f9 |.?.6..|
[8b86 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes
[8b87 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes]}
[8b88 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:99
[8b89 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:99
[8b8a 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[8b8b 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b8c 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b8d 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[8b8e 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b8f 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8b90 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8b91 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8b92 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8b93 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8b94 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8b95 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b3 f2 5f e9 88 6b b8 d7 dd 18 d6 47 d3 62 bc |..._..k.....G.b.|
00000010 16 9c 4a 8f 57 73 81 a1 1e ed 00 0b 9c a4 55 ed |..J.Ws........U.|
[8b96 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 bf 07 eb bb c9 b0 6c 91 a6 f3 |0E.!........l...|
00000010 ef 13 67 fe d4 50 bf d8 6c 89 dd 04 8c fb aa 2c |..g..P..l......,|
00000020 c9 09 8c 47 ad 02 20 60 02 d3 a6 4f ce 72 9a 21 |...G.. `...O.r.!|
00000030 5e ae b2 ca a5 cc d1 5b 83 4e 0c 31 83 a0 4f 90 |^......[.N.1..O.|
00000040 f8 1a c1 fd d8 be d1 |.......|
[8b97 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b98 01-03 17:57:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c490 gate 1578074249529831900 evaluation starts
[8b99 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c490 signed by 0 principal evaluation starts (used [false])
[8b9a 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c490 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8b9b 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8b9c 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c490 principal evaluation fails
[8b9d 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c490 gate 1578074249529831900 evaluation fails
[8b9e 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8b9f 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8ba0 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8ba1 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b3 f2 5f e9 88 6b b8 d7 dd 18 d6 47 d3 62 bc |..._..k.....G.b.|
00000010 16 9c 4a 8f 57 73 81 a1 1e ed 00 0b 9c a4 55 ed |..J.Ws........U.|
[8ba2 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 bf 07 eb bb c9 b0 6c 91 a6 f3 |0E.!........l...|
00000010 ef 13 67 fe d4 50 bf d8 6c 89 dd 04 8c fb aa 2c |..g..P..l......,|
00000020 c9 09 8c 47 ad 02 20 60 02 d3 a6 4f ce 72 9a 21 |...G.. `...O.r.!|
00000030 5e ae b2 ca a5 cc d1 5b 83 4e 0c 31 83 a0 4f 90 |^......[.N.1..O.|
00000040 f8 1a c1 fd d8 be d1 |.......|
[8ba3 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ba4 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547cd90 gate 1578074249532133500 evaluation starts
[8ba5 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547cd90 signed by 0 principal evaluation starts (used [false])
[8ba6 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547cd90 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8ba7 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547cd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8ba8 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547cd90 principal evaluation fails
[8ba9 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547cd90 gate 1578074249532133500 evaluation fails
[8baa 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8bab 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8bac 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8bad 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b3 f2 5f e9 88 6b b8 d7 dd 18 d6 47 d3 62 bc |..._..k.....G.b.|
00000010 16 9c 4a 8f 57 73 81 a1 1e ed 00 0b 9c a4 55 ed |..J.Ws........U.|
[8bae 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 bf 07 eb bb c9 b0 6c 91 a6 f3 |0E.!........l...|
00000010 ef 13 67 fe d4 50 bf d8 6c 89 dd 04 8c fb aa 2c |..g..P..l......,|
00000020 c9 09 8c 47 ad 02 20 60 02 d3 a6 4f ce 72 9a 21 |...G.. `...O.r.!|
00000030 5e ae b2 ca a5 cc d1 5b 83 4e 0c 31 83 a0 4f 90 |^......[.N.1..O.|
00000040 f8 1a c1 fd d8 be d1 |.......|
[8baf 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8bb0 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547d690 gate 1578074249534291000 evaluation starts
[8bb1 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547d690 signed by 0 principal evaluation starts (used [false])
[8bb2 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547d690 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8bb3 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547d690 principal evaluation succeeds for identity 0
[8bb4 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547d690 gate 1578074249534291000 evaluation succeeds
[8bb5 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8bb6 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8bb7 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8bb8 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8bb9 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8bbb 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8bba 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes
[8bbc 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8bbd 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[8bbe 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8bbf 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8bc0 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8bc1 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11746998189731001747 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[8bc2 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11746998189731001747 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[8bc3 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[8bc4 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8bc5 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[8bc6 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8bc7 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8bc8 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11746998189731001747 , Msg_type: BLOCK_MSG, digests: [7 8 1 3 5 6 9 2 4], Envelope: 61 bytes, Signature: 0 bytes
[8bc9 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11746998189731001747 , Msg_type: BLOCK_MSG, digests: [7 8 1 3 5 6 9 2 4], Envelope: 61 bytes, Signature: 0 bytes
[8bca 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11746998189731001747 , Msg_type: BLOCK_MSG, digests: [7 8 1 3 5 6 9 2 4], Envelope: 61 bytes, Signature: 0 bytes
[8bcb 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8bcc 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8bcd 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8bce 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8bcf 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8bd0 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8bd1 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8bd2 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 67 1d 70 a8 da 99 e9 08 58 ac 39 63 7c e4 01 |.g.p.....X.9c|..|
00000010 54 a8 6a 2c 4a 07 6f 4c 71 66 e7 ca 6c 8a a0 2d |T.j,J.oLqf..l..-|
[8bd3 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 53 af 8b 71 6d b7 3e ac d7 83 1c |0D. vS..qm.>....|
00000010 86 f7 59 fb d3 7c 1f d1 f2 63 f2 8a ed b9 85 71 |..Y..|...c.....q|
00000020 c2 05 fe 20 02 20 21 34 21 f5 53 cc 44 cf de 93 |... . !4!.S.D...|
00000030 d7 f7 8c d0 7c 93 0a cf e8 71 e2 99 db 69 0b 0e |....|....q...i..|
00000040 4b 64 20 b8 8b 51 |Kd ..Q|
[8bd4 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8bd5 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548f4c0 gate 1578074249539164400 evaluation starts
[8bd6 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548f4c0 signed by 0 principal evaluation starts (used [false])
[8bd7 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548f4c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8bd8 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548f4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8bd9 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548f4c0 principal evaluation fails
[8bda 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548f4c0 gate 1578074249539164400 evaluation fails
[8bdb 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8bdc 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8bdd 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8bde 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 67 1d 70 a8 da 99 e9 08 58 ac 39 63 7c e4 01 |.g.p.....X.9c|..|
00000010 54 a8 6a 2c 4a 07 6f 4c 71 66 e7 ca 6c 8a a0 2d |T.j,J.oLqf..l..-|
[8bdf 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 53 af 8b 71 6d b7 3e ac d7 83 1c |0D. vS..qm.>....|
00000010 86 f7 59 fb d3 7c 1f d1 f2 63 f2 8a ed b9 85 71 |..Y..|...c.....q|
00000020 c2 05 fe 20 02 20 21 34 21 f5 53 cc 44 cf de 93 |... . !4!.S.D...|
00000030 d7 f7 8c d0 7c 93 0a cf e8 71 e2 99 db 69 0b 0e |....|....q...i..|
00000040 4b 64 20 b8 8b 51 |Kd ..Q|
[8be0 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8be1 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548fdc0 gate 1578074249539588700 evaluation starts
[8be2 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548fdc0 signed by 0 principal evaluation starts (used [false])
[8be3 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548fdc0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8be4 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548fdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8be5 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548fdc0 principal evaluation fails
[8be6 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548fdc0 gate 1578074249539588700 evaluation fails
[8be7 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8be8 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8be9 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8bea 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 67 1d 70 a8 da 99 e9 08 58 ac 39 63 7c e4 01 |.g.p.....X.9c|..|
00000010 54 a8 6a 2c 4a 07 6f 4c 71 66 e7 ca 6c 8a a0 2d |T.j,J.oLqf..l..-|
[8beb 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 53 af 8b 71 6d b7 3e ac d7 83 1c |0D. vS..qm.>....|
00000010 86 f7 59 fb d3 7c 1f d1 f2 63 f2 8a ed b9 85 71 |..Y..|...c.....q|
00000020 c2 05 fe 20 02 20 21 34 21 f5 53 cc 44 cf de 93 |... . !4!.S.D...|
00000030 d7 f7 8c d0 7c 93 0a cf e8 71 e2 99 db 69 0b 0e |....|....q...i..|
00000040 4b 64 20 b8 8b 51 |Kd ..Q|
[8bec 01-03 17:57:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8bed 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058ae6c0 gate 1578074249540003300 evaluation starts
[8bee 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058ae6c0 signed by 0 principal evaluation starts (used [false])
[8bef 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058ae6c0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8bf0 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058ae6c0 principal evaluation succeeds for identity 0
[8bf1 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058ae6c0 gate 1578074249540003300 evaluation succeeds
[8bf2 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8bf3 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8bf4 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8bf5 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8bf6 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes
[8bf7 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8bf8 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8bf9 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 ad 60 4d 2b 8b 72 0e 1e 53 c1 5d 74 14 da 71 |..`M+.r..S.]t..q|
00000010 7c d6 3e a6 dc 8d c0 88 93 41 e7 24 58 e6 6a 71 ||.>......A.$X.jq|
[8bfa 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d bc be a8 68 4a 65 e0 f9 fd 1e a9 |0D. ....hJe.....|
00000010 09 a1 37 a4 9f 28 1a 19 67 a9 07 d3 11 c8 69 95 |..7..(..g.....i.|
00000020 92 9e f4 e7 02 20 01 4c 78 81 ac b9 85 d1 09 77 |..... .Lx......w|
00000030 26 cb ca a7 ff 7e 86 38 0a 83 eb b1 5e b2 f3 a0 |&....~.8....^...|
00000040 15 40 20 18 0a 9c |.@ ...|
[8bfb 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes
[8bfc 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 lastAliveTS: 1578074071871625600, 99 but got ts: inc_num:1578074071871625600 seq_num:98
[8bfd 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8bfe 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[8bff 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 55 17 0f 1d 59 b2 b9 66 44 32 94 32 90 38 a7 |oU...Y..fD2.2.8.|
00000010 7c 13 6c 7b 19 1d 30 4a 37 3e 77 e1 8f e5 60 e8 ||.l{..0J7>w...`.|
[8c00 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 6e 93 29 18 cd 42 0c 9c 0f 3b |0E.!..n.)..B...;|
00000010 84 09 71 d2 a1 46 ed 38 24 d0 b8 53 7b 8a 73 99 |..q..F.8$..S{.s.|
00000020 39 4a ad da 3e 02 20 66 6c f0 6b c1 64 60 04 5a |9J..>. fl.k.d`.Z|
00000030 61 dd 5e 34 45 62 9e 8f 14 9a c8 c8 ec ce 12 eb |a.^4Eb..........|
00000040 2b 84 28 25 08 b2 19 |+.(%...|
[8c01 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes
[8c02 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:94 , Envelope: 83 bytes, Signature: 71 bytes
[8c03 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c04 01-03 17:57:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c05 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074247697960200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[8c06 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8c07 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8c08 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c09 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c0a 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[8c0b 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[8c0c 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c0d 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c0e 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c0f 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074247697960200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[8c10 01-03 17:57:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074247697960200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[8c11 01-03 17:57:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8c12 01-03 17:57:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8c13 01-03 17:57:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c14 01-03 17:57:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074085780100900 seq_num:1578074247697960200 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[8c15 01-03 17:57:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8c16 01-03 17:57:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8c17 01-03 17:57:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c18 01-03 17:57:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c19 01-03 17:57:29.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1068818814495016645 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8c1a 01-03 17:57:29.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1068818814495016645 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8c1b 01-03 17:57:29.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1068818814495016645 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8c1c 01-03 17:57:29.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 7 8 9 1 3 4 6 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[8c1d 01-03 17:57:29.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c1e 01-03 17:57:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[8c1f 01-03 17:57:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c20 01-03 17:57:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c21 01-03 17:57:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c22 01-03 17:57:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c23 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074247642009600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[8c24 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c25 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8c26 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8c27 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8c28 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8c29 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8c2a 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8c2b 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8c2c 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8c2d 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c2e 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9660 gate 1578074250075206900 evaluation starts
[8c2f 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9660 signed by 0 principal evaluation starts (used [false])
[8c30 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9660 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8c31 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8c32 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9660 principal evaluation fails
[8c33 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9660 gate 1578074250075206900 evaluation fails
[8c34 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8c35 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8c36 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8c37 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8c38 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8c39 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c3a 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9f60 gate 1578074250077100400 evaluation starts
[8c3b 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9f60 signed by 0 principal evaluation starts (used [false])
[8c3c 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9f60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8c3d 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8c3e 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9f60 principal evaluation fails
[8c3f 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058e9f60 gate 1578074250077100400 evaluation fails
[8c40 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8c41 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8c42 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8c43 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8c44 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8c45 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c46 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00590a860 gate 1578074250078923300 evaluation starts
[8c47 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00590a860 signed by 0 principal evaluation starts (used [false])
[8c48 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00590a860 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8c49 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00590a860 principal evaluation succeeds for identity 0
[8c4a 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00590a860 gate 1578074250078923300 evaluation succeeds
[8c4b 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8c4c 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8c4d 01-03 17:57:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8c4e 01-03 17:57:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8c4f 01-03 17:57:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c50 01-03 17:57:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c51 01-03 17:57:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086264611600 seq_num:1578074247642009600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 71 bytes
[8c52 01-03 17:57:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c53 01-03 17:57:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8c54 01-03 17:57:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8c55 01-03 17:57:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8c56 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8c57 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8c58 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8c59 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8c5a 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8c5b 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c5c 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005920f80 gate 1578074250104159700 evaluation starts
[8c5d 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005920f80 signed by 0 principal evaluation starts (used [false])
[8c5e 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005920f80 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8c5f 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005920f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8c60 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005920f80 principal evaluation fails
[8c61 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005920f80 gate 1578074250104159700 evaluation fails
[8c62 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8c63 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8c64 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8c65 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8c66 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8c67 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c68 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005921880 gate 1578074250105637700 evaluation starts
[8c69 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005921880 signed by 0 principal evaluation starts (used [false])
[8c6a 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005921880 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8c6b 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005921880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8c6c 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005921880 principal evaluation fails
[8c6d 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005921880 gate 1578074250105637700 evaluation fails
[8c6e 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8c6f 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8c70 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8c71 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8c72 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8c73 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c74 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005932180 gate 1578074250106087000 evaluation starts
[8c75 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005932180 signed by 0 principal evaluation starts (used [false])
[8c76 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005932180 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8c77 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005932180 principal evaluation succeeds for identity 0
[8c78 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005932180 gate 1578074250106087000 evaluation succeeds
[8c79 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8c7a 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8c7b 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8c7c 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8c7d 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c7e 01-03 17:57:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c7f 01-03 17:57:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[8c80 01-03 17:57:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c81 01-03 17:57:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c82 01-03 17:57:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c83 01-03 17:57:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c84 01-03 17:57:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1578074086527374500 seq_num:1578074247636379800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > , Envelope: 110 bytes, Signature: 70 bytes
[8c85 01-03 17:57:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c86 01-03 17:57:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8c87 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8c88 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8c89 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8c8a 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8c8b 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8c8c 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8c8d 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8c8e 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c8f 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005933de0 gate 1578074250346686800 evaluation starts
[8c90 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005933de0 signed by 0 principal evaluation starts (used [false])
[8c91 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005933de0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8c92 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005933de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8c93 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005933de0 principal evaluation fails
[8c94 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005933de0 gate 1578074250346686800 evaluation fails
[8c95 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8c96 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8c97 01-03 17:57:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8c98 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8c99 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8c9a 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c9b 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059506e0 gate 1578074250353914200 evaluation starts
[8c9c 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059506e0 signed by 0 principal evaluation starts (used [false])
[8c9d 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059506e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8c9e 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059506e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8c9f 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059506e0 principal evaluation fails
[8ca0 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059506e0 gate 1578074250353914200 evaluation fails
[8ca1 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8ca2 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8ca3 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8ca4 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8ca5 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8ca6 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ca7 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005950fe0 gate 1578074250357054100 evaluation starts
[8ca8 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005950fe0 signed by 0 principal evaluation starts (used [false])
[8ca9 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005950fe0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8caa 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005950fe0 principal evaluation succeeds for identity 0
[8cab 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005950fe0 gate 1578074250357054100 evaluation succeeds
[8cac 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8cad 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8cae 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8caf 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8cb0 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cb1 01-03 17:57:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cb2 01-03 17:57:31.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[8cb3 01-03 17:57:31.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[8cb4 01-03 17:57:31.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510221801
[8cb5 01-03 17:57:31.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E50FBD409DCA4DA8B204DAE2031632934B3A38678BBD074577B45C473C063E2A
[8cb6 01-03 17:57:31.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[8cb7 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cb8 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cb9 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cba 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cbb 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:34 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[8cbc 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cbe 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cbd 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:34 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[8cbf 01-03 17:57:31.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cc0 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8cc1 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8cc2 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cc3 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8cc4 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8cc5 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 04 03 b1 bf 1a 62 3e 83 ad aa 45 ea be 55 d7 |......b>...E..U.|
00000010 fa 73 4b 46 f8 98 c1 08 58 ee 79 a7 b6 5b be 7a |.sKF....X.y..[.z|
[8cc6 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d c7 07 d7 e7 5e ae 14 5f d2 28 22 |0D. }....^.._.("|
00000010 d1 4b d0 03 e3 f8 f4 b8 56 f3 62 dd 1e b6 b3 ef |.K......V.b.....|
00000020 9d 51 49 eb 02 20 5d 2c fa b3 56 23 5f 6e 3f 2e |.QI.. ],..V#_n?.|
00000030 5f c9 3d 48 55 97 cb 90 2c f2 44 fd 37 f9 82 8e |_.=HU...,.D.7...|
00000040 8c d2 17 b3 02 42 |.....B|
[8cc7 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[8cc8 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 ad 18 48 bf b9 e2 51 0d c1 36 |0E.!....H...Q..6|
00000010 da 52 07 4b 5f 75 a4 db 02 52 c1 62 4f c7 81 7c |.R.K_u...R.bO..||
00000020 12 a2 e5 db 6e 02 20 48 d2 0b 42 c4 f3 fd 19 3a |....n. H..B....:|
00000030 d1 92 6d ab e2 22 e8 74 27 e9 cf 64 1e 58 36 d9 |..m..".t'..d.X6.|
00000040 d8 81 ae 04 1e 29 4e |.....)N|
[8cc9 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8cca 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[8ccb 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100
[8ccc 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100
[8ccd 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8cce 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ccf 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cd0 01-03 17:57:31.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cd1 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cd2 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cd3 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cd4 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8cd5 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cd6 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8cd7 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[8cd8 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cd9 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[8cda 01-03 17:57:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cdb 01-03 17:57:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[8cdc 01-03 17:57:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[8cdd 01-03 17:57:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cde 01-03 17:57:31.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cdf 01-03 17:57:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[8ce0 01-03 17:57:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ce1 01-03 17:57:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[8ce2 01-03 17:57:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ce3 01-03 17:57:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:12650244119274250426 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8ce4 01-03 17:57:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:12650244119274250426 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8ce5 01-03 17:57:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12650244119274250426 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8ce6 01-03 17:57:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[8ce7 01-03 17:57:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ce8 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[8ce9 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[8cea 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ceb 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[8cec 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8ced 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 57 ce b0 2d 5f 28 fc b2 b6 a5 33 c9 36 3e 5d |tW..-_(....3.6>]|
00000010 b0 ac c4 68 52 23 4b c1 8e 0c 03 82 40 0f c8 6a |...hR#K.....@..j|
[8cee 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 93 13 9c 13 df 98 b7 cf d8 bf |0E.!............|
00000010 bc e1 59 17 1c a5 30 7c ac 68 6c 80 b5 fd 54 12 |..Y...0|.hl...T.|
00000020 30 c4 a7 1a 82 02 20 7a 2d 31 d3 ec 1c 60 39 ea |0..... z-1...`9.|
00000030 51 28 aa 66 6a e0 2d 5f 74 5b 76 26 d2 cc fe f3 |Q(.fj.-_t[v&....|
00000040 8d 74 4f a5 fe 85 5f |.tO..._|
[8cef 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[8cf0 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 cf ee 06 bd f3 73 a1 83 5e 99 41 |0D. S.....s..^.A|
00000010 f3 bb e4 a4 4e 2d 62 60 92 14 b9 aa 57 8c 37 97 |....N-b`....W.7.|
00000020 6d af 5d d2 02 20 01 9a 6c 38 3f 9a 85 7a fe 7a |m.].. ..l8?..z.z|
00000030 a3 3d 44 5a 00 75 4c 7b ab 29 81 94 2b 07 46 3c |.=DZ.uL{.)..+.F<|
00000040 e7 ce b9 49 6f cb |...Io.|
[8cf1 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8cf2 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[8cf3 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101
[8cf4 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101
[8cf5 01-03 17:57:31.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[8cf6 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cf7 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cf8 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cf9 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[8cfa 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cfb 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cfc 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[8cfd 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[8cfe 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[8cff 01-03 17:57:31.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d00 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d01 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d02 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d03 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[8d04 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d05 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d06 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8d07 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8d08 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8d09 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8d0a 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8d0b 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 d0 5e 1c 40 d3 07 b3 07 49 46 86 38 30 0c 11 |..^.@....IF.80..|
00000010 20 1a 46 38 9a f8 a0 40 a5 0a 93 ef e8 07 91 61 | .F8...@.......a|
[8d0c 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 1d 16 da 1a 93 28 d3 df 75 82 |0E.!.......(..u.|
00000010 8a db 21 bb 69 d4 f8 f4 e5 96 fb ec 78 08 82 8e |..!.i.......x...|
00000020 ef 5d 17 62 08 02 20 03 84 76 36 ca f8 04 58 5a |.].b.. ..v6...XZ|
00000030 bd 98 2f e2 5f ef 6f fc e0 ed 3b d4 c0 60 a6 fe |../._.o...;..`..|
00000040 9f 7f 43 54 bf b3 ff |..CT...|
[8d0d 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d0e 01-03 17:57:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b88e0 gate 1578074252979727500 evaluation starts
[8d0f 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b88e0 signed by 0 principal evaluation starts (used [false])
[8d10 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b88e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8d11 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b88e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8d12 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b88e0 principal evaluation fails
[8d13 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b88e0 gate 1578074252979727500 evaluation fails
[8d14 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8d15 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8d16 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8d17 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 d0 5e 1c 40 d3 07 b3 07 49 46 86 38 30 0c 11 |..^.@....IF.80..|
00000010 20 1a 46 38 9a f8 a0 40 a5 0a 93 ef e8 07 91 61 | .F8...@.......a|
[8d18 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 1d 16 da 1a 93 28 d3 df 75 82 |0E.!.......(..u.|
00000010 8a db 21 bb 69 d4 f8 f4 e5 96 fb ec 78 08 82 8e |..!.i.......x...|
00000020 ef 5d 17 62 08 02 20 03 84 76 36 ca f8 04 58 5a |.].b.. ..v6...XZ|
00000030 bd 98 2f e2 5f ef 6f fc e0 ed 3b d4 c0 60 a6 fe |../._.o...;..`..|
00000040 9f 7f 43 54 bf b3 ff |..CT...|
[8d19 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d1a 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b91e0 gate 1578074252988588100 evaluation starts
[8d1b 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b91e0 signed by 0 principal evaluation starts (used [false])
[8d1c 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b91e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8d1d 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b91e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8d1e 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b91e0 principal evaluation fails
[8d1f 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b91e0 gate 1578074252988588100 evaluation fails
[8d20 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8d21 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8d22 01-03 17:57:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8d23 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 d0 5e 1c 40 d3 07 b3 07 49 46 86 38 30 0c 11 |..^.@....IF.80..|
00000010 20 1a 46 38 9a f8 a0 40 a5 0a 93 ef e8 07 91 61 | .F8...@.......a|
[8d24 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 1d 16 da 1a 93 28 d3 df 75 82 |0E.!.......(..u.|
00000010 8a db 21 bb 69 d4 f8 f4 e5 96 fb ec 78 08 82 8e |..!.i.......x...|
00000020 ef 5d 17 62 08 02 20 03 84 76 36 ca f8 04 58 5a |.].b.. ..v6...XZ|
00000030 bd 98 2f e2 5f ef 6f fc e0 ed 3b d4 c0 60 a6 fe |../._.o...;..`..|
00000040 9f 7f 43 54 bf b3 ff |..CT...|
[8d25 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d26 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b9ae0 gate 1578074252994049000 evaluation starts
[8d27 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b9ae0 signed by 0 principal evaluation starts (used [false])
[8d28 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b9ae0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8d29 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b9ae0 principal evaluation succeeds for identity 0
[8d2a 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b9ae0 gate 1578074252994049000 evaluation succeeds
[8d2b 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8d2c 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8d2d 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8d2e 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8d2f 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d31 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d30 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d32 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes]}
[8d33 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96
[8d34 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96
[8d35 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[8d36 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d37 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d38 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d39 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d3a 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d3b 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d3c 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d3d 01-03 17:57:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d3e 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d3f 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d40 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d41 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d42 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d43 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d44 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d45 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d46 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8d47 01-03 17:57:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d48 01-03 17:57:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d4a 01-03 17:57:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d49 01-03 17:57:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d4b 01-03 17:57:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8d4c 01-03 17:57:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes
[8d4d 01-03 17:57:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d4e 01-03 17:57:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:7708335749960740873 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8d4f 01-03 17:57:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7708335749960740873 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8d50 01-03 17:57:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d51 01-03 17:57:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d52 01-03 17:57:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d53 01-03 17:57:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d54 01-03 17:57:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d55 01-03 17:57:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d56 01-03 17:57:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[8d57 01-03 17:57:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d58 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:10238913492824451895 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8d59 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10238913492824451895 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8d5a 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d5b 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d5c 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d5d 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d5e 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d5f 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d60 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[8d61 01-03 17:57:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d62 01-03 17:57:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8d63 01-03 17:57:33.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d64 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8d65 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[8d66 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d67 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d68 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8d69 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8d6a 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8d6b 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8d6c 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8d6d 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 51 24 95 5c 5b 9a ff 7a 0a d6 eb d2 53 17 1a |.Q$.\[..z....S..|
00000010 91 ba f9 5b 60 97 dc 67 7c 1b 4d aa ce 7d 40 9e |...[`..g|.M..}@.|
[8d6e 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a da f4 1e d5 da 61 6a 29 56 a3 |0E.!.......aj)V.|
00000010 bc 24 cc 9e 38 15 08 c4 7c c2 69 d8 c7 1e 45 64 |.$..8...|.i...Ed|
00000020 ed 07 6b b4 3d 02 20 1b ed 3f 86 f5 c1 fe a9 1f |..k.=. ..?......|
00000030 2c 81 45 bd 26 3e cd 79 ca 3f 5b b1 ba 4d 14 e0 |,.E.&>.y.?[..M..|
00000040 89 39 42 ec f2 e2 84 |.9B....|
[8d6f 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d70 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a01cb0 gate 1578074253116832400 evaluation starts
[8d71 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a01cb0 signed by 0 principal evaluation starts (used [false])
[8d72 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a01cb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8d73 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a01cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8d74 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a01cb0 principal evaluation fails
[8d75 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a01cb0 gate 1578074253116832400 evaluation fails
[8d76 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8d77 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8d78 01-03 17:57:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8d79 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 51 24 95 5c 5b 9a ff 7a 0a d6 eb d2 53 17 1a |.Q$.\[..z....S..|
00000010 91 ba f9 5b 60 97 dc 67 7c 1b 4d aa ce 7d 40 9e |...[`..g|.M..}@.|
[8d7a 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a da f4 1e d5 da 61 6a 29 56 a3 |0E.!.......aj)V.|
00000010 bc 24 cc 9e 38 15 08 c4 7c c2 69 d8 c7 1e 45 64 |.$..8...|.i...Ed|
00000020 ed 07 6b b4 3d 02 20 1b ed 3f 86 f5 c1 fe a9 1f |..k.=. ..?......|
00000030 2c 81 45 bd 26 3e cd 79 ca 3f 5b b1 ba 4d 14 e0 |,.E.&>.y.?[..M..|
00000040 89 39 42 ec f2 e2 84 |.9B....|
[8d7b 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d7c 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a1c5b0 gate 1578074253121798900 evaluation starts
[8d7d 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a1c5b0 signed by 0 principal evaluation starts (used [false])
[8d7e 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a1c5b0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8d7f 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a1c5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8d80 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a1c5b0 principal evaluation fails
[8d81 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a1c5b0 gate 1578074253121798900 evaluation fails
[8d82 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8d83 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8d84 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8d85 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 51 24 95 5c 5b 9a ff 7a 0a d6 eb d2 53 17 1a |.Q$.\[..z....S..|
00000010 91 ba f9 5b 60 97 dc 67 7c 1b 4d aa ce 7d 40 9e |...[`..g|.M..}@.|
[8d86 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a da f4 1e d5 da 61 6a 29 56 a3 |0E.!.......aj)V.|
00000010 bc 24 cc 9e 38 15 08 c4 7c c2 69 d8 c7 1e 45 64 |.$..8...|.i...Ed|
00000020 ed 07 6b b4 3d 02 20 1b ed 3f 86 f5 c1 fe a9 1f |..k.=. ..?......|
00000030 2c 81 45 bd 26 3e cd 79 ca 3f 5b b1 ba 4d 14 e0 |,.E.&>.y.?[..M..|
00000040 89 39 42 ec f2 e2 84 |.9B....|
[8d87 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d88 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059c7320 gate 1578074253123060900 evaluation starts
[8d89 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059c7320 signed by 0 principal evaluation starts (used [false])
[8d8a 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059c7320 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8d8b 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059c7320 principal evaluation succeeds for identity 0
[8d8c 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059c7320 gate 1578074253123060900 evaluation succeeds
[8d8d 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8d8e 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8d8f 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8d90 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8d91 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8d92 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes]}
[8d93 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100
[8d94 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100
[8d95 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8d96 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d97 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d98 01-03 17:57:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d99 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d9a 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d9b 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d9c 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d9d 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8d9e 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8da0 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8da1 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8da3 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8da2 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8da4 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8da5 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8da6 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8da7 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8d9f 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8da8 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8da9 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8daa 01-03 17:57:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dab 01-03 17:57:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8dac 01-03 17:57:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8dad 01-03 17:57:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dae 01-03 17:57:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[8daf 01-03 17:57:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8db0 01-03 17:57:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:101 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8db1 01-03 17:57:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8db2 01-03 17:57:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:101 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8db3 01-03 17:57:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[8db4 01-03 17:57:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8db5 01-03 17:57:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8db6 01-03 17:57:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8db7 01-03 17:57:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8db8 01-03 17:57:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8db9 01-03 17:57:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8dba 01-03 17:57:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8dbb 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e2 ba aa 34 9e 9b 85 30 54 a7 3a 15 18 c1 dc |s...4...0T.:....|
00000010 cf 82 56 38 39 ec d9 43 ee e7 5c 90 08 8e 7e c2 |..V89..C..\...~.|
[8dbc 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b5 70 ff b4 70 41 e2 4b bd ea 9d |0D. ..p..pA.K...|
00000010 ae f5 22 9c cb d7 8b e5 d1 25 26 6f 64 27 93 83 |.."......%&od'..|
00000020 1a 8c 46 77 02 20 29 f5 30 6d b9 9f 93 ec 25 b3 |..Fw. ).0m....%.|
00000030 6d 51 61 17 82 81 0c eb 1a 94 9e dc 48 b4 86 ad |mQa.........H...|
00000040 54 db 57 c1 55 74 |T.W.Ut|
[8dbd 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8dbe 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52320 gate 1578074253185350000 evaluation starts
[8dbf 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52320 signed by 0 principal evaluation starts (used [false])
[8dc0 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52320 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8dc1 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8dc2 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52320 principal evaluation fails
[8dc3 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52320 gate 1578074253185350000 evaluation fails
[8dc4 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8dc5 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8dc6 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8dc7 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e2 ba aa 34 9e 9b 85 30 54 a7 3a 15 18 c1 dc |s...4...0T.:....|
00000010 cf 82 56 38 39 ec d9 43 ee e7 5c 90 08 8e 7e c2 |..V89..C..\...~.|
[8dc8 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b5 70 ff b4 70 41 e2 4b bd ea 9d |0D. ..p..pA.K...|
00000010 ae f5 22 9c cb d7 8b e5 d1 25 26 6f 64 27 93 83 |.."......%&od'..|
00000020 1a 8c 46 77 02 20 29 f5 30 6d b9 9f 93 ec 25 b3 |..Fw. ).0m....%.|
00000030 6d 51 61 17 82 81 0c eb 1a 94 9e dc 48 b4 86 ad |mQa.........H...|
00000040 54 db 57 c1 55 74 |T.W.Ut|
[8dc9 01-03 17:57:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8dca 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52c20 gate 1578074253189717800 evaluation starts
[8dcb 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52c20 signed by 0 principal evaluation starts (used [false])
[8dcc 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52c20 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8dcd 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8dce 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52c20 principal evaluation fails
[8dcf 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a52c20 gate 1578074253189717800 evaluation fails
[8dd0 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8dd1 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8dd2 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8dd3 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e2 ba aa 34 9e 9b 85 30 54 a7 3a 15 18 c1 dc |s...4...0T.:....|
00000010 cf 82 56 38 39 ec d9 43 ee e7 5c 90 08 8e 7e c2 |..V89..C..\...~.|
[8dd4 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b5 70 ff b4 70 41 e2 4b bd ea 9d |0D. ..p..pA.K...|
00000010 ae f5 22 9c cb d7 8b e5 d1 25 26 6f 64 27 93 83 |.."......%&od'..|
00000020 1a 8c 46 77 02 20 29 f5 30 6d b9 9f 93 ec 25 b3 |..Fw. ).0m....%.|
00000030 6d 51 61 17 82 81 0c eb 1a 94 9e dc 48 b4 86 ad |mQa.........H...|
00000040 54 db 57 c1 55 74 |T.W.Ut|
[8dd5 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8dd6 01-03 17:57:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a53520 gate 1578074253196765700 evaluation starts
[8dd7 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a53520 signed by 0 principal evaluation starts (used [false])
[8dd8 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a53520 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8dd9 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a53520 principal evaluation succeeds for identity 0
[8dda 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF315105F
[8ddb 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a53520 gate 1578074253196765700 evaluation succeeds
[8ddc 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8ddd 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8dde 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8de0 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8de1 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:101 , Envelope: 83 bytes, Signature: 70 bytes
[8de2 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:101 , Envelope: 83 bytes, Signature: 70 bytes]}
[8de3 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:101
[8de4 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:101
[8de5 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[8de6 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ddf 01-03 17:57:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E9BE9E922CE3D424A09A98A577B968878866749309163033A97B4CD19268DD24
[8de7 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8de8 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8de9 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8dea 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dec 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[8ded 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8dee 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8def 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8df0 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[8df1 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8df2 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[8df3 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8df4 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8df5 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8df6 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8deb 01-03 17:57:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[8df7 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8df8 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[8df9 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8dfa 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8dfb 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes
[8dfc 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dfd 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8dfe 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dff 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:95 , Envelope: 83 bytes, Signature: 71 bytes
[8e00 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e01 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8e02 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e03 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8e04 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[8e05 01-03 17:57:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e06 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8e07 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8e08 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8e09 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8e0a 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8e0b 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8e0c 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 1f f7 8e 4c 9a 76 4c 4b 32 53 b2 65 68 92 d9 |....L.vLK2S.eh..|
00000010 8a 57 46 02 33 9b c0 02 e0 a8 3b 7e 37 4d 71 98 |.WF.3.....;~7Mq.|
[8e0d 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 8a cf f6 14 8b 72 b5 03 ca 09 2e |0D. 6.....r.....|
00000010 79 ce 40 18 b0 9b 64 0e 49 e5 18 8c c0 6c de 47 |y.@...d.I....l.G|
00000020 4e 2b b9 41 02 20 38 41 b2 cb bd 17 76 9d d3 c4 |N+.A. 8A....v...|
00000030 0a 83 91 fa a0 8b b6 91 62 19 f8 ca 4b 1e 3d e2 |........b...K.=.|
00000040 2e a9 0d f4 83 93 |......|
[8e0e 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e0f 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8cf70 gate 1578074253236524100 evaluation starts
[8e10 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8cf70 signed by 0 principal evaluation starts (used [false])
[8e11 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8cf70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8e12 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8cf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8e13 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8cf70 principal evaluation fails
[8e14 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8cf70 gate 1578074253236524100 evaluation fails
[8e15 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8e16 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8e17 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8e18 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 1f f7 8e 4c 9a 76 4c 4b 32 53 b2 65 68 92 d9 |....L.vLK2S.eh..|
00000010 8a 57 46 02 33 9b c0 02 e0 a8 3b 7e 37 4d 71 98 |.WF.3.....;~7Mq.|
[8e19 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 8a cf f6 14 8b 72 b5 03 ca 09 2e |0D. 6.....r.....|
00000010 79 ce 40 18 b0 9b 64 0e 49 e5 18 8c c0 6c de 47 |y.@...d.I....l.G|
00000020 4e 2b b9 41 02 20 38 41 b2 cb bd 17 76 9d d3 c4 |N+.A. 8A....v...|
00000030 0a 83 91 fa a0 8b b6 91 62 19 f8 ca 4b 1e 3d e2 |........b...K.=.|
00000040 2e a9 0d f4 83 93 |......|
[8e1a 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e1b 01-03 17:57:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8d870 gate 1578074253239958300 evaluation starts
[8e1c 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8d870 signed by 0 principal evaluation starts (used [false])
[8e1d 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8d870 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8e1e 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8d870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8e1f 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8d870 principal evaluation fails
[8e20 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8d870 gate 1578074253239958300 evaluation fails
[8e21 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8e22 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8e23 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8e24 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 1f f7 8e 4c 9a 76 4c 4b 32 53 b2 65 68 92 d9 |....L.vLK2S.eh..|
00000010 8a 57 46 02 33 9b c0 02 e0 a8 3b 7e 37 4d 71 98 |.WF.3.....;~7Mq.|
[8e25 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 8a cf f6 14 8b 72 b5 03 ca 09 2e |0D. 6.....r.....|
00000010 79 ce 40 18 b0 9b 64 0e 49 e5 18 8c c0 6c de 47 |y.@...d.I....l.G|
00000020 4e 2b b9 41 02 20 38 41 b2 cb bd 17 76 9d d3 c4 |N+.A. 8A....v...|
00000030 0a 83 91 fa a0 8b b6 91 62 19 f8 ca 4b 1e 3d e2 |........b...K.=.|
00000040 2e a9 0d f4 83 93 |......|
[8e26 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e27 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aa8170 gate 1578074253243864500 evaluation starts
[8e28 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aa8170 signed by 0 principal evaluation starts (used [false])
[8e29 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aa8170 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8e2a 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aa8170 principal evaluation succeeds for identity 0
[8e2b 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aa8170 gate 1578074253243864500 evaluation succeeds
[8e2c 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8e2d 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8e2e 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8e2f 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8e30 01-03 17:57:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes
[8e31 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes]}
[8e32 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[8e33 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:97
[8e34 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:97
[8e35 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:96 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[8e36 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e37 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e38 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e39 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:18431428768922721378 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[8e3a 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[8e3b 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e3d 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e3e 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e3f 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[8e40 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8e41 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8e42 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e43 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:18431428768922721378 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8e3c 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[8e44 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e45 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11405884701552520149 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[8e46 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[8e47 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14670753084787321341 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[8e48 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14670753084787321341 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8e49 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e4a 01-03 17:57:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11405884701552520149 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8e4b 01-03 17:57:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e4c 01-03 17:57:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11405884701552520149 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[8e4d 01-03 17:57:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11405884701552520149 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[8e4e 01-03 17:57:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11405884701552520149 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[8e4f 01-03 17:57:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e50 01-03 17:57:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14670753084787321341 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[8e51 01-03 17:57:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14670753084787321341 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[8e52 01-03 17:57:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e53 01-03 17:57:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18431428768922721378 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[8e54 01-03 17:57:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18431428768922721378 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[8e55 01-03 17:57:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e56 01-03 17:57:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e57 01-03 17:57:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e58 01-03 17:57:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[8e59 01-03 17:57:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[8e5a 01-03 17:57:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e5b 01-03 17:57:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[8e5c 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e5d 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[8e5e 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e5f 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[8e60 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[8e61 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8e62 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8e63 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[8e64 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[8e65 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e66 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e67 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8e68 01-03 17:57:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8e69 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8e6a 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8e6b 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8e6c 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8e6d 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8e6e 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8e6f 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e70 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06080 gate 1578074253358103700 evaluation starts
[8e71 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06080 signed by 0 principal evaluation starts (used [false])
[8e72 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06080 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8e73 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8e74 01-03 17:57:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06080 principal evaluation fails
[8e75 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06080 gate 1578074253358103700 evaluation fails
[8e76 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8e77 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8e78 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8e79 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8e7a 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8e7b 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e7c 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06980 gate 1578074253363731000 evaluation starts
[8e7d 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06980 signed by 0 principal evaluation starts (used [false])
[8e7e 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06980 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8e7f 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8e80 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06980 principal evaluation fails
[8e81 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b06980 gate 1578074253363731000 evaluation fails
[8e82 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8e83 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8e84 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8e85 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8e86 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8e87 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e88 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b07280 gate 1578074253366558300 evaluation starts
[8e89 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b07280 signed by 0 principal evaluation starts (used [false])
[8e8a 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b07280 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8e8b 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b07280 principal evaluation succeeds for identity 0
[8e8c 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b07280 gate 1578074253366558300 evaluation succeeds
[8e8d 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8e8e 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8e8f 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8e90 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8e91 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e92 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e93 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8e94 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8e95 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8e96 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8e97 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8e98 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8e99 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8e9a 01-03 17:57:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8e9b 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e9c 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1ace0 gate 1578074253370301900 evaluation starts
[8e9d 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1ace0 signed by 0 principal evaluation starts (used [false])
[8e9e 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1ace0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8e9f 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1ace0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8ea0 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1ace0 principal evaluation fails
[8ea1 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1ace0 gate 1578074253370301900 evaluation fails
[8ea2 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8ea3 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8ea4 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8ea5 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8ea6 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8ea7 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ea8 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1b5e0 gate 1578074253375876000 evaluation starts
[8ea9 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1b5e0 signed by 0 principal evaluation starts (used [false])
[8eaa 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1b5e0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8eab 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1b5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8eac 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1b5e0 principal evaluation fails
[8ead 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1b5e0 gate 1578074253375876000 evaluation fails
[8eae 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8eaf 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8eb0 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8eb1 01-03 17:57:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8eb2 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8eb3 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8eb4 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1bee0 gate 1578074253381455100 evaluation starts
[8eb5 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1bee0 signed by 0 principal evaluation starts (used [false])
[8eb6 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1bee0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8eb7 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1bee0 principal evaluation succeeds for identity 0
[8eb8 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b1bee0 gate 1578074253381455100 evaluation succeeds
[8eb9 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8eba 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8ebb 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8ebc 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8ebd 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ebe 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[8ebf 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ec0 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ec1 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ec2 01-03 17:57:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8ec3 01-03 17:57:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8ec4 01-03 17:57:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8ec5 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151060
[8ec6 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F72138592CE43DFC2079A990352CF16AD90DE0909D77043C9ABF98B33DFEE240
[8ec7 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8ec8 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8ec9 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8eca 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[8ecb 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ecc 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[8ece 01-03 17:57:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[8ecf 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[8ed0 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ecd 01-03 17:57:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8ed1 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8ed2 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8ed5 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8ed3 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8ed6 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8ed7 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ed8 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ed9 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b2fbf0 gate 1578074253419902400 evaluation starts
[8eda 01-03 17:57:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b2fbf0 signed by 0 principal evaluation starts (used [false])
[8edb 01-03 17:57:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b2fbf0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8edc 01-03 17:57:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b2fbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8edd 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b2fbf0 principal evaluation fails
[8ede 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b2fbf0 gate 1578074253419902400 evaluation fails
[8edf 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8ee0 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8ee1 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8ee2 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8ee3 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8ee4 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ee5 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b565f0 gate 1578074253439320300 evaluation starts
[8ee6 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b565f0 signed by 0 principal evaluation starts (used [false])
[8ee7 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b565f0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8ee8 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b565f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8ee9 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b565f0 principal evaluation fails
[8eea 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b565f0 gate 1578074253439320300 evaluation fails
[8eeb 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8eec 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8eed 01-03 17:57:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8eee 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8eef 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8ef0 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ef1 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b56ef0 gate 1578074253442129400 evaluation starts
[8ef2 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b56ef0 signed by 0 principal evaluation starts (used [false])
[8ef3 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b56ef0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8ef4 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b56ef0 principal evaluation succeeds for identity 0
[8ef5 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b56ef0 gate 1578074253442129400 evaluation succeeds
[8ef6 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8ef7 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8ef8 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8ef9 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8efa 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[8efb 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[8efc 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8ed4 01-03 17:57:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8efd 01-03 17:57:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[8efe 01-03 17:57:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8eff 01-03 17:57:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8f00 01-03 17:57:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f01 01-03 17:57:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f02 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f03 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f04 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f05 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f06 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f07 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8f08 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8f09 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8f0a 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f0b 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b678c0 gate 1578074253475296700 evaluation starts
[8f0c 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b678c0 signed by 0 principal evaluation starts (used [false])
[8f0d 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b678c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8f0e 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b678c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8f0f 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b678c0 principal evaluation fails
[8f10 01-03 17:57:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b678c0 gate 1578074253475296700 evaluation fails
[8f11 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8f12 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8f13 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8f14 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8f15 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8f16 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f17 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7c1c0 gate 1578074253487400700 evaluation starts
[8f18 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7c1c0 signed by 0 principal evaluation starts (used [false])
[8f19 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7c1c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8f1a 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7c1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8f1b 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7c1c0 principal evaluation fails
[8f1c 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7c1c0 gate 1578074253487400700 evaluation fails
[8f1d 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8f1e 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8f1f 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f20 01-03 17:57:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8f21 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8f22 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f23 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7cac0 gate 1578074253493089900 evaluation starts
[8f24 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7cac0 signed by 0 principal evaluation starts (used [false])
[8f25 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7cac0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8f26 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7cac0 principal evaluation succeeds for identity 0
[8f27 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b7cac0 gate 1578074253493089900 evaluation succeeds
[8f28 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f29 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f2a 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f2b 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f2c 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8f2d 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[8f2e 01-03 17:57:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f2f 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f30 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f31 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f32 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f33 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f34 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f35 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f36 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8f37 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8f38 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8f39 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f3a 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b947d0 gate 1578074253504203200 evaluation starts
[8f3b 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b947d0 signed by 0 principal evaluation starts (used [false])
[8f3c 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b947d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8f3d 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b947d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8f3e 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b947d0 principal evaluation fails
[8f3f 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b947d0 gate 1578074253504203200 evaluation fails
[8f40 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8f41 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8f42 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8f43 01-03 17:57:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8f44 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8f45 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f46 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b950d0 gate 1578074253511870700 evaluation starts
[8f47 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b950d0 signed by 0 principal evaluation starts (used [false])
[8f48 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b950d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8f49 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b950d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8f4a 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b950d0 principal evaluation fails
[8f4b 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b950d0 gate 1578074253511870700 evaluation fails
[8f4c 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8f4d 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8f4e 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f4f 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[8f50 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[8f51 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f52 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b959d0 gate 1578074253517801100 evaluation starts
[8f53 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b959d0 signed by 0 principal evaluation starts (used [false])
[8f54 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b959d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8f55 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b959d0 principal evaluation succeeds for identity 0
[8f56 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b959d0 gate 1578074253517801100 evaluation succeeds
[8f57 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f58 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f59 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f5a 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f5b 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[8f5c 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[8f5d 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[8f5e 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[8f5f 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f60 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f61 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f62 01-03 17:57:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f63 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f64 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f65 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f66 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8f67 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8f68 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8f69 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f6a 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8190 gate 1578074253526960300 evaluation starts
[8f6b 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8190 signed by 0 principal evaluation starts (used [false])
[8f6c 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8190 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8f6d 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8f6e 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8190 principal evaluation fails
[8f6f 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8190 gate 1578074253526960300 evaluation fails
[8f70 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8f71 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8f72 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8f73 01-03 17:57:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8f74 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8f75 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f76 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8a90 gate 1578074253531467400 evaluation starts
[8f77 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8a90 signed by 0 principal evaluation starts (used [false])
[8f78 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8a90 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8f79 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8f7a 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8a90 principal evaluation fails
[8f7b 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc8a90 gate 1578074253531467400 evaluation fails
[8f7c 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8f7d 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8f7e 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f7f 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[8f80 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[8f81 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f82 01-03 17:57:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f84 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f85 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[8f86 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f87 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f88 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3529486178564499836 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[8f89 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3529486178564499836 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8f8a 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8f8b 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3529486178564499836 , Msg_type: BLOCK_MSG, digests: [2 4 5 6 9 1 3 7 8], Envelope: 60 bytes, Signature: 0 bytes
[8f83 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc9390 gate 1578074253540139600 evaluation starts
[8f8c 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc9390 signed by 0 principal evaluation starts (used [false])
[8f8d 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc9390 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8f8e 01-03 17:57:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc9390 principal evaluation succeeds for identity 0
[8f8f 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bc9390 gate 1578074253540139600 evaluation succeeds
[8f90 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f91 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f92 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f93 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f94 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8f95 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8f96 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8f97 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[8f98 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8f99 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[8f9a 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f9b 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f9c 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f9d 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f9e 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f9f 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8fa0 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8fa1 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 1f f7 8e 4c 9a 76 4c 4b 32 53 b2 65 68 92 d9 |....L.vLK2S.eh..|
00000010 8a 57 46 02 33 9b c0 02 e0 a8 3b 7e 37 4d 71 98 |.WF.3.....;~7Mq.|
[8fa2 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 8a cf f6 14 8b 72 b5 03 ca 09 2e |0D. 6.....r.....|
00000010 79 ce 40 18 b0 9b 64 0e 49 e5 18 8c c0 6c de 47 |y.@...d.I....l.G|
00000020 4e 2b b9 41 02 20 38 41 b2 cb bd 17 76 9d d3 c4 |N+.A. 8A....v...|
00000030 0a 83 91 fa a0 8b b6 91 62 19 f8 ca 4b 1e 3d e2 |........b...K.=.|
00000040 2e a9 0d f4 83 93 |......|
[8fa3 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8fa4 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be92b0 gate 1578074253553959700 evaluation starts
[8fa5 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be92b0 signed by 0 principal evaluation starts (used [false])
[8fa6 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be92b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8fa7 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be92b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8fa8 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be92b0 principal evaluation fails
[8fa9 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be92b0 gate 1578074253553959700 evaluation fails
[8faa 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8fab 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8fac 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8fad 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 1f f7 8e 4c 9a 76 4c 4b 32 53 b2 65 68 92 d9 |....L.vLK2S.eh..|
00000010 8a 57 46 02 33 9b c0 02 e0 a8 3b 7e 37 4d 71 98 |.WF.3.....;~7Mq.|
[8fae 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 8a cf f6 14 8b 72 b5 03 ca 09 2e |0D. 6.....r.....|
00000010 79 ce 40 18 b0 9b 64 0e 49 e5 18 8c c0 6c de 47 |y.@...d.I....l.G|
00000020 4e 2b b9 41 02 20 38 41 b2 cb bd 17 76 9d d3 c4 |N+.A. 8A....v...|
00000030 0a 83 91 fa a0 8b b6 91 62 19 f8 ca 4b 1e 3d e2 |........b...K.=.|
00000040 2e a9 0d f4 83 93 |......|
[8faf 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8fb0 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be9bb0 gate 1578074253556192300 evaluation starts
[8fb1 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be9bb0 signed by 0 principal evaluation starts (used [false])
[8fb2 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be9bb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8fb3 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be9bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8fb4 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be9bb0 principal evaluation fails
[8fb5 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005be9bb0 gate 1578074253556192300 evaluation fails
[8fb6 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8fb7 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8fb8 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8fb9 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 1f f7 8e 4c 9a 76 4c 4b 32 53 b2 65 68 92 d9 |....L.vLK2S.eh..|
00000010 8a 57 46 02 33 9b c0 02 e0 a8 3b 7e 37 4d 71 98 |.WF.3.....;~7Mq.|
[8fba 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 8a cf f6 14 8b 72 b5 03 ca 09 2e |0D. 6.....r.....|
00000010 79 ce 40 18 b0 9b 64 0e 49 e5 18 8c c0 6c de 47 |y.@...d.I....l.G|
00000020 4e 2b b9 41 02 20 38 41 b2 cb bd 17 76 9d d3 c4 |N+.A. 8A....v...|
00000030 0a 83 91 fa a0 8b b6 91 62 19 f8 ca 4b 1e 3d e2 |........b...K.=.|
00000040 2e a9 0d f4 83 93 |......|
[8fbb 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8fbc 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c004b0 gate 1578074253558541300 evaluation starts
[8fbd 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c004b0 signed by 0 principal evaluation starts (used [false])
[8fbe 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c004b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[8fbf 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c004b0 principal evaluation succeeds for identity 0
[8fc0 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c004b0 gate 1578074253558541300 evaluation succeeds
[8fc1 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8fc2 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8fc3 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8fc4 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8fc5 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes
[8fc6 01-03 17:57:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fc7 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[8fc8 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 21 38 59 2c e4 3d fc 20 79 a9 90 35 2c f1 6a |.!8Y,.=. y..5,.j|
00000010 d9 0d e0 90 9d 77 04 3c 9a bf 98 b3 3d fe e2 40 |.....w.<....=..@|
[8fc9 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 02 42 ef e6 26 cc 3b a4 fc 3a 52 |0D. A.B..&.;..:R|
00000010 d9 f9 0b 20 6f 84 4f b1 cc 21 24 e5 13 5a ac 95 |... o.O..!$..Z..|
00000020 e5 da c5 4f 02 20 3f 6d 97 bd 69 c6 ac bb c8 ad |...O. ?m..i.....|
00000030 bb 72 2f 86 5b c9 1a 2a ba 59 ba 5c 5b 96 e8 53 |.r/.[..*.Y.\[..S|
00000040 ac 9c f0 93 68 32 |....h2|
[8fca 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8fcb 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8fcc 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fcd 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[8fce 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 57 ce b0 2d 5f 28 fc b2 b6 a5 33 c9 36 3e 5d |tW..-_(....3.6>]|
00000010 b0 ac c4 68 52 23 4b c1 8e 0c 03 82 40 0f c8 6a |...hR#K.....@..j|
[8fcf 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 93 13 9c 13 df 98 b7 cf d8 bf |0E.!............|
00000010 bc e1 59 17 1c a5 30 7c ac 68 6c 80 b5 fd 54 12 |..Y...0|.hl...T.|
00000020 30 c4 a7 1a 82 02 20 7a 2d 31 d3 ec 1c 60 39 ea |0..... z-1...`9.|
00000030 51 28 aa 66 6a e0 2d 5f 74 5b 76 26 d2 cc fe f3 |Q(.fj.-_t[v&....|
00000040 8d 74 4f a5 fe 85 5f |.tO..._|
[8fd0 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[8fd1 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fd2 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fd3 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[8fd4 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fd6 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8fd5 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[8fd7 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 21 38 59 2c e4 3d fc 20 79 a9 90 35 2c f1 6a |.!8Y,.=. y..5,.j|
00000010 d9 0d e0 90 9d 77 04 3c 9a bf 98 b3 3d fe e2 40 |.....w.<....=..@|
[8fd8 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 02 42 ef e6 26 cc 3b a4 fc 3a 52 |0D. A.B..&.;..:R|
00000010 d9 f9 0b 20 6f 84 4f b1 cc 21 24 e5 13 5a ac 95 |... o.O..!$..Z..|
00000020 e5 da c5 4f 02 20 3f 6d 97 bd 69 c6 ac bb c8 ad |...O. ?m..i.....|
00000030 bb 72 2f 86 5b c9 1a 2a ba 59 ba 5c 5b 96 e8 53 |.r/.[..*.Y.\[..S|
00000040 ac 9c f0 93 68 32 |....h2|
[8fd9 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[8fda 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 cc 70 4c a9 87 3c 77 cc 80 a7 b0 |0D. S.pL..<w....|
00000010 47 32 40 5f 8f 12 60 7d 06 c9 b4 d6 20 f6 ba 8a |G2@_..`}.... ...|
00000020 03 18 3d 3c 02 20 76 37 cf 99 97 42 f4 c3 b1 18 |..=<. v7...B....|
00000030 1d b5 b0 9d 53 37 68 b8 3c 2a ff 81 64 89 15 1f |....S7h.<*..d...|
00000040 3f 2a cd 48 5f 0a |?*.H_.|
[8fdb 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8fdc 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8fdd 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fde 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fdf 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8fe0 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fe2 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3529486178564499836 , Msg_type: BLOCK_MSG, digests: [2 4 5 6 9 1 3 7 8], Envelope: 60 bytes, Signature: 0 bytes
[8fe1 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[8fe3 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3529486178564499836 , Msg_type: BLOCK_MSG, digests: [2 4 5 6 9 1 3 7 8], Envelope: 60 bytes, Signature: 0 bytes
[8fe5 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fe4 01-03 17:57:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fe6 01-03 17:57:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8fe7 01-03 17:57:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8fe9 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8fe8 01-03 17:57:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[8fea 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8fec 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8fed 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8feb 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[8fee 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e2 ba aa 34 9e 9b 85 30 54 a7 3a 15 18 c1 dc |s...4...0T.:....|
00000010 cf 82 56 38 39 ec d9 43 ee e7 5c 90 08 8e 7e c2 |..V89..C..\...~.|
[8ff0 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b5 70 ff b4 70 41 e2 4b bd ea 9d |0D. ..p..pA.K...|
00000010 ae f5 22 9c cb d7 8b e5 d1 25 26 6f 64 27 93 83 |.."......%&od'..|
00000020 1a 8c 46 77 02 20 29 f5 30 6d b9 9f 93 ec 25 b3 |..Fw. ).0m....%.|
00000030 6d 51 61 17 82 81 0c eb 1a 94 9e dc 48 b4 86 ad |mQa.........H...|
00000040 54 db 57 c1 55 74 |T.W.Ut|
[8ff1 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ff2 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c38500 gate 1578074253590006200 evaluation starts
[8fef 01-03 17:57:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ff3 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c38500 signed by 0 principal evaluation starts (used [false])
[8ff4 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ff5 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c38500 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[8ff7 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c38500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[8ff8 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c38500 principal evaluation fails
[8ff9 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c38500 gate 1578074253590006200 evaluation fails
[8ffa 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8ffb 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8ffc 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8ffd 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e2 ba aa 34 9e 9b 85 30 54 a7 3a 15 18 c1 dc |s...4...0T.:....|
00000010 cf 82 56 38 39 ec d9 43 ee e7 5c 90 08 8e 7e c2 |..V89..C..\...~.|
[8ffe 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b5 70 ff b4 70 41 e2 4b bd ea 9d |0D. ..p..pA.K...|
00000010 ae f5 22 9c cb d7 8b e5 d1 25 26 6f 64 27 93 83 |.."......%&od'..|
00000020 1a 8c 46 77 02 20 29 f5 30 6d b9 9f 93 ec 25 b3 |..Fw. ).0m....%.|
00000030 6d 51 61 17 82 81 0c eb 1a 94 9e dc 48 b4 86 ad |mQa.........H...|
00000040 54 db 57 c1 55 74 |T.W.Ut|
[8fff 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ff6 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9000 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0ffe0 gate 1578074253595246200 evaluation starts
[9001 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0ffe0 signed by 0 principal evaluation starts (used [false])
[9002 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0ffe0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9003 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0ffe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9004 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0ffe0 principal evaluation fails
[9005 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c0ffe0 gate 1578074253595246200 evaluation fails
[9006 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9007 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9008 01-03 17:57:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9009 01-03 17:57:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e2 ba aa 34 9e 9b 85 30 54 a7 3a 15 18 c1 dc |s...4...0T.:....|
00000010 cf 82 56 38 39 ec d9 43 ee e7 5c 90 08 8e 7e c2 |..V89..C..\...~.|
[900a 01-03 17:57:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b5 70 ff b4 70 41 e2 4b bd ea 9d |0D. ..p..pA.K...|
00000010 ae f5 22 9c cb d7 8b e5 d1 25 26 6f 64 27 93 83 |.."......%&od'..|
00000020 1a 8c 46 77 02 20 29 f5 30 6d b9 9f 93 ec 25 b3 |..Fw. ).0m....%.|
00000030 6d 51 61 17 82 81 0c eb 1a 94 9e dc 48 b4 86 ad |mQa.........H...|
00000040 54 db 57 c1 55 74 |T.W.Ut|
[900b 01-03 17:57:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[900c 01-03 17:57:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c39240 gate 1578074253608265400 evaluation starts
[900d 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c39240 signed by 0 principal evaluation starts (used [false])
[900e 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c39240 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[900f 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c39240 principal evaluation succeeds for identity 0
[9010 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c39240 gate 1578074253608265400 evaluation succeeds
[9011 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9012 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9013 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9014 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9015 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:101 , Envelope: 83 bytes, Signature: 70 bytes
[9016 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9017 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[9018 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 57 ce b0 2d 5f 28 fc b2 b6 a5 33 c9 36 3e 5d |tW..-_(....3.6>]|
00000010 b0 ac c4 68 52 23 4b c1 8e 0c 03 82 40 0f c8 6a |...hR#K.....@..j|
[9019 01-03 17:57:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 93 13 9c 13 df 98 b7 cf d8 bf |0E.!............|
00000010 bc e1 59 17 1c a5 30 7c ac 68 6c 80 b5 fd 54 12 |..Y...0|.hl...T.|
00000020 30 c4 a7 1a 82 02 20 7a 2d 31 d3 ec 1c 60 39 ea |0..... z-1...`9.|
00000030 51 28 aa 66 6a e0 2d 5f 74 5b 76 26 d2 cc fe f3 |Q(.fj.-_t[v&....|
00000040 8d 74 4f a5 fe 85 5f |.tO..._|
[901a 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[901b 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[901c 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[901d 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 21 38 59 2c e4 3d fc 20 79 a9 90 35 2c f1 6a |.!8Y,.=. y..5,.j|
00000010 d9 0d e0 90 9d 77 04 3c 9a bf 98 b3 3d fe e2 40 |.....w.<....=..@|
[901e 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 02 42 ef e6 26 cc 3b a4 fc 3a 52 |0D. A.B..&.;..:R|
00000010 d9 f9 0b 20 6f 84 4f b1 cc 21 24 e5 13 5a ac 95 |... o.O..!$..Z..|
00000020 e5 da c5 4f 02 20 3f 6d 97 bd 69 c6 ac bb c8 ad |...O. ?m..i.....|
00000030 bb 72 2f 86 5b c9 1a 2a ba 59 ba 5c 5b 96 e8 53 |.r/.[..*.Y.\[..S|
00000040 ac 9c f0 93 68 32 |....h2|
[901f 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[9020 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[9021 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9022 01-03 17:57:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9023 01-03 17:57:33.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4083435799363164254 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[9024 01-03 17:57:33.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4083435799363164254 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[9025 01-03 17:57:33.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4083435799363164254 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[9026 01-03 17:57:33.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 5 7 8 9 2 3 4 6] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[9027 01-03 17:57:33.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9028 01-03 17:57:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[9029 01-03 17:57:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[902a 01-03 17:57:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[902b 01-03 17:57:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[902c 01-03 17:57:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[902d 01-03 17:57:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[902e 01-03 17:57:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[902f 01-03 17:57:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9030 01-03 17:57:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9031 01-03 17:57:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9032 01-03 17:57:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:7829712945268180167 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9033 01-03 17:57:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:7829712945268180167 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9034 01-03 17:57:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7829712945268180167 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9035 01-03 17:57:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[9036 01-03 17:57:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9037 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[9038 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[9039 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[903a 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[903b 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[903c 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 2a da 14 05 2f 4d 0d 82 26 0e 27 4f c5 a9 d7 |.*.../M..&.'O...|
00000010 d7 18 b0 5f 40 9e 6d b6 f5 f1 96 e0 42 b1 b7 fa |..._@.m.....B...|
[903d 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 29 36 16 82 2f ac ed 05 49 85 12 |0D. q)6../...I..|
00000010 9d 19 a0 bf af 36 1d b1 12 0b d7 f7 5d 0f a9 94 |.....6......]...|
00000020 9b 16 fe c5 02 20 7f 52 c9 96 83 e1 48 9e d0 f6 |..... .R....H...|
00000030 12 ed 02 a0 4e 62 c8 87 45 68 55 0f 9f 14 55 7e |....Nb..EhU...U~|
00000040 49 b4 f8 f8 12 d5 |I.....|
[903e 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[903f 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 d2 93 a9 cd bf 1f 3f d2 c5 36 |0E.!........?..6|
00000010 dd fd 9c 92 6f 33 60 9a 4d ee f9 6a e3 1d 28 42 |....o3`.M..j..(B|
00000020 f5 cd 28 06 bc 02 20 15 c5 c4 73 ab ec e3 db 71 |..(... ...s....q|
00000030 a4 ad 69 0a 27 d5 a9 9d bf 64 be 38 33 ed 2d c5 |..i.'....d.83.-.|
00000040 de 20 5e 25 b5 d1 27 |. ^%..'|
[9040 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9041 01-03 17:57:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[9042 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:102
[9043 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:102
[9044 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[9045 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9046 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9047 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9048 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[9049 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[904a 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[904b 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[904c 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[904d 01-03 17:57:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[904e 01-03 17:57:35.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[904f 01-03 17:57:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[9050 01-03 17:57:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[9051 01-03 17:57:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510231801
[9052 01-03 17:57:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C49AAE424C082E619282A3CF4D61512897ADAE2317189C617F83B53802053399
[9053 01-03 17:57:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[9054 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9055 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9056 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9057 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9058 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:35 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[9059 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[905a 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[905b 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:35 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[905c 01-03 17:57:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[905d 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[905e 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[905f 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9060 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9061 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[9062 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 fe 2f 7c 49 bb 7f d5 a0 fb 4f 72 fc 74 df 32 |4./|I.....Or.t.2|
00000010 90 07 5a cc 76 58 d8 c7 06 ed 43 7b 85 55 a5 4a |..Z.vX....C{.U.J|
[9063 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f e1 f2 d7 6f 7f af 2c 09 e4 7d |0E.!.....o..,..}|
00000010 14 4c 2f 73 39 29 ee 07 02 37 35 27 99 e2 00 1b |.L/s9)...75'....|
00000020 45 1a e9 9a 2b 02 20 00 ce 07 0e af af 83 a4 b0 |E...+. .........|
00000030 72 00 c8 44 d6 53 50 00 4d 08 a7 52 0a e9 0f 87 |r..D.SP.M..R....|
00000040 6b bb 2e a1 c2 81 7a |k.....z|
[9064 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[9065 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc bf a0 ea 7f 99 78 f1 35 23 0a |0E.!.......x.5#.|
00000010 9c 7f d4 8f cc 5a 44 7a e2 6b 9a c0 de b6 c4 fa |.....ZDz.k......|
00000020 b3 ca 93 48 da 02 20 0b 64 9b f3 37 36 7e 32 d7 |...H.. .d..76~2.|
00000030 b1 05 04 3f ec 15 1a 11 19 af e7 ff 0a d7 48 70 |...?..........Hp|
00000040 e2 2e 8e 7e 4b 56 0f |...~KV.|
[9066 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9067 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[9068 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103
[9069 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103
[906a 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[906b 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[906c 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[906d 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[906e 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[906f 01-03 17:57:36.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9070 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9071 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[9072 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9073 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[9074 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9075 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9076 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9077 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9078 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9079 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[907a 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[907b 01-03 17:57:36.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[907c 01-03 17:57:36.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[907d 01-03 17:57:36.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[907e 01-03 17:57:36.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[907f 01-03 17:57:36.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9080 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:13907871349645512834 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[9081 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13907871349645512834 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[9082 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9083 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9084 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9085 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9086 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9087 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9088 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[9089 01-03 17:57:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[908a 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:4931571400815743995 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[908b 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4931571400815743995 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[908c 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[908d 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[908e 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[908f 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9090 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9091 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9092 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[9093 01-03 17:57:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9094 01-03 17:57:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[9095 01-03 17:57:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9096 01-03 17:57:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[9097 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[9098 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9099 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[909a 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[909b 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[909c 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[909d 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[909e 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[909f 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 ef 2d 1f ad a0 9d 47 41 90 1f 49 20 c6 f7 3d |X.-....GA..I ..=|
00000010 26 e1 79 48 a1 70 38 a5 e0 5b 82 66 d1 ed 68 2c |&.yH.p8..[.f..h,|
[90a0 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 2a 40 43 0b 4a e2 5d 94 7a 97 |0E.!..*@C.J.].z.|
00000010 1d 98 4d 08 ae 05 52 b3 ce 99 49 be bd 22 67 2b |..M...R...I.."g+|
00000020 49 20 49 55 f8 02 20 25 ad 98 e9 02 82 14 10 b3 |I IU.. %........|
00000030 db bf 30 8e b8 77 2c be e7 de 7c f4 68 bb ad 3c |..0..w,...|.h..<|
00000040 8d 1a 7b 0c 93 47 ca |..{..G.|
[90a1 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[90a2 01-03 17:57:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf4710 gate 1578074257174240100 evaluation starts
[90a3 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf4710 signed by 0 principal evaluation starts (used [false])
[90a4 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf4710 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[90a5 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf4710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[90a6 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf4710 principal evaluation fails
[90a7 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf4710 gate 1578074257174240100 evaluation fails
[90a8 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[90a9 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[90aa 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[90ab 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 ef 2d 1f ad a0 9d 47 41 90 1f 49 20 c6 f7 3d |X.-....GA..I ..=|
00000010 26 e1 79 48 a1 70 38 a5 e0 5b 82 66 d1 ed 68 2c |&.yH.p8..[.f..h,|
[90ac 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 2a 40 43 0b 4a e2 5d 94 7a 97 |0E.!..*@C.J.].z.|
00000010 1d 98 4d 08 ae 05 52 b3 ce 99 49 be bd 22 67 2b |..M...R...I.."g+|
00000020 49 20 49 55 f8 02 20 25 ad 98 e9 02 82 14 10 b3 |I IU.. %........|
00000030 db bf 30 8e b8 77 2c be e7 de 7c f4 68 bb ad 3c |..0..w,...|.h..<|
00000040 8d 1a 7b 0c 93 47 ca |..{..G.|
[90ad 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[90ae 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5010 gate 1578074257182157700 evaluation starts
[90af 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5010 signed by 0 principal evaluation starts (used [false])
[90b0 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5010 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[90b1 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[90b2 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5010 principal evaluation fails
[90b3 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5010 gate 1578074257182157700 evaluation fails
[90b4 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[90b5 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[90b6 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[90b7 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 ef 2d 1f ad a0 9d 47 41 90 1f 49 20 c6 f7 3d |X.-....GA..I ..=|
00000010 26 e1 79 48 a1 70 38 a5 e0 5b 82 66 d1 ed 68 2c |&.yH.p8..[.f..h,|
[90b8 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 2a 40 43 0b 4a e2 5d 94 7a 97 |0E.!..*@C.J.].z.|
00000010 1d 98 4d 08 ae 05 52 b3 ce 99 49 be bd 22 67 2b |..M...R...I.."g+|
00000020 49 20 49 55 f8 02 20 25 ad 98 e9 02 82 14 10 b3 |I IU.. %........|
00000030 db bf 30 8e b8 77 2c be e7 de 7c f4 68 bb ad 3c |..0..w,...|.h..<|
00000040 8d 1a 7b 0c 93 47 ca |..{..G.|
[90b9 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[90ba 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5910 gate 1578074257182548600 evaluation starts
[90bb 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5910 signed by 0 principal evaluation starts (used [false])
[90bc 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5910 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[90bd 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5910 principal evaluation succeeds for identity 0
[90be 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005cf5910 gate 1578074257182548600 evaluation succeeds
[90bf 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[90c0 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[90c1 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[90c2 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[90c3 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes
[90c4 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes]}
[90c5 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:102
[90c6 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:102
[90c7 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:101 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[90c8 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90c9 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90ca 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90cb 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[90cc 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90cd 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90ce 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90cf 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[90d0 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[90d1 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[90d2 01-03 17:57:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90d3 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[90d4 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90d5 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[90d6 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[90d7 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90d8 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[90d9 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[90da 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[90db 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[90dc 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[90dd 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[90de 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 4b bd 3f 8d 5a 49 fc 60 a2 40 22 21 b4 8a bc |.K.?.ZI.`.@"!...|
00000010 b1 94 06 5a 73 ae 55 16 c3 38 15 6c 24 8b 49 68 |...Zs.U..8.l$.Ih|
[90df 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 79 c2 20 1d 93 93 72 23 25 11 45 |0D. py. ...r#%.E|
00000010 8e 2e d1 a0 c4 42 b1 31 9c ad b6 ee 0f 8a 0c 6e |.....B.1.......n|
00000020 af 94 8c c3 02 20 7c ea 7a 1b 9b f7 16 58 87 11 |..... |.z....X..|
00000030 18 67 64 34 a9 c9 ee a0 75 82 69 ce 7d 1a 65 b7 |.gd4....u.i.}.e.|
00000040 ba 0b 1d f9 5b f2 |....[.|
[90e0 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[90e1 01-03 17:57:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d206b0 gate 1578074257229969000 evaluation starts
[90e2 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d206b0 signed by 0 principal evaluation starts (used [false])
[90e3 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d206b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[90e4 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d206b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[90e5 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d206b0 principal evaluation fails
[90e6 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d206b0 gate 1578074257229969000 evaluation fails
[90e7 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[90e8 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[90e9 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[90ea 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 4b bd 3f 8d 5a 49 fc 60 a2 40 22 21 b4 8a bc |.K.?.ZI.`.@"!...|
00000010 b1 94 06 5a 73 ae 55 16 c3 38 15 6c 24 8b 49 68 |...Zs.U..8.l$.Ih|
[90eb 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 79 c2 20 1d 93 93 72 23 25 11 45 |0D. py. ...r#%.E|
00000010 8e 2e d1 a0 c4 42 b1 31 9c ad b6 ee 0f 8a 0c 6e |.....B.1.......n|
00000020 af 94 8c c3 02 20 7c ea 7a 1b 9b f7 16 58 87 11 |..... |.z....X..|
00000030 18 67 64 34 a9 c9 ee a0 75 82 69 ce 7d 1a 65 b7 |.gd4....u.i.}.e.|
00000040 ba 0b 1d f9 5b f2 |....[.|
[90ec 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[90ed 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d20fb0 gate 1578074257232282200 evaluation starts
[90ee 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d20fb0 signed by 0 principal evaluation starts (used [false])
[90ef 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d20fb0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[90f0 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d20fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[90f1 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d20fb0 principal evaluation fails
[90f2 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d20fb0 gate 1578074257232282200 evaluation fails
[90f3 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[90f4 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[90f5 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[90f6 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 4b bd 3f 8d 5a 49 fc 60 a2 40 22 21 b4 8a bc |.K.?.ZI.`.@"!...|
00000010 b1 94 06 5a 73 ae 55 16 c3 38 15 6c 24 8b 49 68 |...Zs.U..8.l$.Ih|
[90f7 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 79 c2 20 1d 93 93 72 23 25 11 45 |0D. py. ...r#%.E|
00000010 8e 2e d1 a0 c4 42 b1 31 9c ad b6 ee 0f 8a 0c 6e |.....B.1.......n|
00000020 af 94 8c c3 02 20 7c ea 7a 1b 9b f7 16 58 87 11 |..... |.z....X..|
00000030 18 67 64 34 a9 c9 ee a0 75 82 69 ce 7d 1a 65 b7 |.gd4....u.i.}.e.|
00000040 ba 0b 1d f9 5b f2 |....[.|
[90f8 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[90f9 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d218b0 gate 1578074257234531100 evaluation starts
[90fa 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d218b0 signed by 0 principal evaluation starts (used [false])
[90fb 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d218b0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[90fc 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d218b0 principal evaluation succeeds for identity 0
[90fd 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d218b0 gate 1578074257234531100 evaluation succeeds
[90fe 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[90ff 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9100 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9101 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9102 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes
[9103 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes]}
[9104 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:98
[9105 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:98
[9106 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[9107 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9108 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9109 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[910a 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[910b 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[910c 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[910d 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[910e 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[910f 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[9110 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[9111 01-03 17:57:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9112 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[9113 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10350684210006751402 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[9114 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[9115 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15540698517372603034 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[9116 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[9117 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13191960948555378932 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[9118 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13191960948555378932 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[9119 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[911a 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10350684210006751402 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[911b 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[911c 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15540698517372603034 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[911d 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[911e 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13191960948555378932 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[911f 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13191960948555378932 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[9120 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13191960948555378932 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes
[9121 01-03 17:57:37.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9122 01-03 17:57:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15540698517372603034 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[9123 01-03 17:57:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15540698517372603034 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[9124 01-03 17:57:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9125 01-03 17:57:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10350684210006751402 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[9126 01-03 17:57:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10350684210006751402 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes
[9127 01-03 17:57:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9128 01-03 17:57:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9129 01-03 17:57:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[912a 01-03 17:57:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[912b 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[912c 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[912e 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[912d 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[9130 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9131 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[9132 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9133 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9134 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9135 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9136 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9137 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9138 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9139 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[913a 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[913b 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[913c 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[913d 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[913e 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c060 gate 1578074257345459800 evaluation starts
[913f 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c060 signed by 0 principal evaluation starts (used [false])
[9140 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c060 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9141 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[9142 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c060 principal evaluation fails
[9143 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c060 gate 1578074257345459800 evaluation fails
[9144 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9145 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9146 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9147 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[9148 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[9149 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[914a 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c960 gate 1578074257346235700 evaluation starts
[914b 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c960 signed by 0 principal evaluation starts (used [false])
[914c 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c960 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[914d 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[914e 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c960 principal evaluation fails
[914f 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5c960 gate 1578074257346235700 evaluation fails
[9150 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9151 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9152 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9153 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[9154 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[9155 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9156 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5d260 gate 1578074257347292600 evaluation starts
[9157 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5d260 signed by 0 principal evaluation starts (used [false])
[9158 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5d260 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9159 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5d260 principal evaluation succeeds for identity 0
[915a 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d5d260 gate 1578074257347292600 evaluation succeeds
[915b 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[915c 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[915d 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[915e 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[915f 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[9160 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[9161 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[9162 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[9163 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9164 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[912f 01-03 17:57:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9165 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9166 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9167 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9168 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9169 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[916a 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[916b 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[916c 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[916d 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[916e 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[916f 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d75a30 gate 1578074257353621400 evaluation starts
[9170 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d75a30 signed by 0 principal evaluation starts (used [false])
[9171 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d75a30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9172 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d75a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[9173 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d75a30 principal evaluation fails
[9174 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d75a30 gate 1578074257353621400 evaluation fails
[9175 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9176 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9177 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9178 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9179 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[917a 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[917b 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92330 gate 1578074257354280400 evaluation starts
[917c 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92330 signed by 0 principal evaluation starts (used [false])
[917d 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92330 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[917e 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[917f 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92330 principal evaluation fails
[9180 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92330 gate 1578074257354280400 evaluation fails
[9181 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9182 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9183 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9184 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9185 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9186 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9187 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92c30 gate 1578074257354959400 evaluation starts
[9188 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92c30 signed by 0 principal evaluation starts (used [false])
[9189 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92c30 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[918a 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92c30 principal evaluation succeeds for identity 0
[918b 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d92c30 gate 1578074257354959400 evaluation succeeds
[918c 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[918d 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[918e 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[918f 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9190 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9191 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[9192 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[9193 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[9194 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[9195 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[9196 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9197 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9198 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9199 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[919a 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[919b 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[919c 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[919d 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[919e 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[919f 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[91a0 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91a1 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d49710 gate 1578074257356923000 evaluation starts
[91a2 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d49710 signed by 0 principal evaluation starts (used [false])
[91a3 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d49710 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[91a4 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d49710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[91a5 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d49710 principal evaluation fails
[91a6 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005d49710 gate 1578074257356923000 evaluation fails
[91a7 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[91a8 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[91a9 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[91aa 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[91ab 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[91ac 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91ad 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc010 gate 1578074257357426500 evaluation starts
[91ae 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc010 signed by 0 principal evaluation starts (used [false])
[91af 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc010 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[91b0 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[91b1 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc010 principal evaluation fails
[91b2 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc010 gate 1578074257357426500 evaluation fails
[91b3 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[91b4 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[91b5 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[91b6 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[91b7 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[91b8 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91b9 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc910 gate 1578074257357803900 evaluation starts
[91ba 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc910 signed by 0 principal evaluation starts (used [false])
[91bb 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc910 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[91bc 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc910 principal evaluation succeeds for identity 0
[91bd 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ebc910 gate 1578074257357803900 evaluation succeeds
[91be 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[91bf 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[91c0 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[91c1 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[91c2 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91c3 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91c4 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[91c5 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[91c6 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[91c7 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[91c8 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[91c9 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[91ca 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[91cb 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[91cc 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91cd 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede370 gate 1578074257358847800 evaluation starts
[91ce 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede370 signed by 0 principal evaluation starts (used [false])
[91cf 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede370 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[91d0 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[91d1 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede370 principal evaluation fails
[91d2 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede370 gate 1578074257358847800 evaluation fails
[91d3 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[91d4 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[91d5 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[91d6 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[91d7 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[91d8 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91d9 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edec70 gate 1578074257359387800 evaluation starts
[91da 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edec70 signed by 0 principal evaluation starts (used [false])
[91db 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edec70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[91dc 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edec70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[91dd 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edec70 principal evaluation fails
[91de 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edec70 gate 1578074257359387800 evaluation fails
[91df 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[91e0 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[91e1 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[91e2 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[91e3 01-03 17:57:37.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[91e4 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91e5 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edf570 gate 1578074257360057100 evaluation starts
[91e6 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edf570 signed by 0 principal evaluation starts (used [false])
[91e7 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edf570 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[91e8 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edf570 principal evaluation succeeds for identity 0
[91e9 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004edf570 gate 1578074257360057100 evaluation succeeds
[91ea 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[91eb 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[91ec 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[91ed 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[91ee 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91ef 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[91f0 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91f1 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91f2 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91f3 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[91f4 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[91f5 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[91f6 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[91f7 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[91f8 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[91f9 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[91fa 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[91fb 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91fc 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047833c0 gate 1578074257364778400 evaluation starts
[91fd 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047833c0 signed by 0 principal evaluation starts (used [false])
[91fe 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047833c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[91ff 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047833c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[9200 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047833c0 principal evaluation fails
[9201 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047833c0 gate 1578074257364778400 evaluation fails
[9202 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9203 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9204 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9205 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9206 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9207 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9208 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004783cc0 gate 1578074257365175100 evaluation starts
[9209 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004783cc0 signed by 0 principal evaluation starts (used [false])
[920a 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004783cc0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[920b 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004783cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[920c 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004783cc0 principal evaluation fails
[920d 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004783cc0 gate 1578074257365175100 evaluation fails
[920e 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[920f 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9210 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9211 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9212 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9213 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9214 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445c0 gate 1578074257365553900 evaluation starts
[9215 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445c0 signed by 0 principal evaluation starts (used [false])
[9216 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445c0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9217 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445c0 principal evaluation succeeds for identity 0
[9218 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445c0 gate 1578074257365553900 evaluation succeeds
[9219 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[921a 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[921b 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[921c 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[921d 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[921e 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[921f 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[9220 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[9221 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9222 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9223 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9224 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9225 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9226 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9227 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9228 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9229 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[922a 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[922b 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[922c 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ede0 gate 1578074257366748700 evaluation starts
[922d 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ede0 signed by 0 principal evaluation starts (used [false])
[922e 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ede0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[922f 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ede0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[9230 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ede0 principal evaluation fails
[9231 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ede0 gate 1578074257366748700 evaluation fails
[9232 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9233 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9234 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9235 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[9236 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[9237 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9238 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449f6e0 gate 1578074257367130000 evaluation starts
[9239 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449f6e0 signed by 0 principal evaluation starts (used [false])
[923a 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449f6e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[923b 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449f6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[923c 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449f6e0 principal evaluation fails
[923d 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449f6e0 gate 1578074257367130000 evaluation fails
[923e 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[923f 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9240 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9241 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[9242 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[9243 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9244 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ffe0 gate 1578074257367506600 evaluation starts
[9245 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ffe0 signed by 0 principal evaluation starts (used [false])
[9246 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ffe0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9247 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ffe0 principal evaluation succeeds for identity 0
[9248 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ffe0 gate 1578074257367506600 evaluation succeeds
[9249 01-03 17:57:37.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[924a 01-03 17:57:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[924b 01-03 17:57:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[924c 01-03 17:57:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[924d 01-03 17:57:37.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[924e 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151061
[924f 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E8A6D3C08AC3AF23E2B6C3E251EB63B1115D5476BA4B6D5CAD1BF351EAB77164
[9250 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[9251 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[9252 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9253 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[9254 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9255 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[9256 01-03 17:57:37.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9257 01-03 17:57:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[9258 01-03 17:57:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9259 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[925a 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[925b 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[925c 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[925d 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[925e 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[925f 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9260 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9261 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9262 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 4b bd 3f 8d 5a 49 fc 60 a2 40 22 21 b4 8a bc |.K.?.ZI.`.@"!...|
00000010 b1 94 06 5a 73 ae 55 16 c3 38 15 6c 24 8b 49 68 |...Zs.U..8.l$.Ih|
[9263 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 79 c2 20 1d 93 93 72 23 25 11 45 |0D. py. ...r#%.E|
00000010 8e 2e d1 a0 c4 42 b1 31 9c ad b6 ee 0f 8a 0c 6e |.....B.1.......n|
00000020 af 94 8c c3 02 20 7c ea 7a 1b 9b f7 16 58 87 11 |..... |.z....X..|
00000030 18 67 64 34 a9 c9 ee a0 75 82 69 ce 7d 1a 65 b7 |.gd4....u.i.}.e.|
00000040 ba 0b 1d f9 5b f2 |....[.|
[9264 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9265 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042700d0 gate 1578074257432255900 evaluation starts
[9266 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042700d0 signed by 0 principal evaluation starts (used [false])
[9267 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042700d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9268 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042700d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[9269 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042700d0 principal evaluation fails
[926a 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042700d0 gate 1578074257432255900 evaluation fails
[926b 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[926c 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[926d 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[926e 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 4b bd 3f 8d 5a 49 fc 60 a2 40 22 21 b4 8a bc |.K.?.ZI.`.@"!...|
00000010 b1 94 06 5a 73 ae 55 16 c3 38 15 6c 24 8b 49 68 |...Zs.U..8.l$.Ih|
[926f 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 79 c2 20 1d 93 93 72 23 25 11 45 |0D. py. ...r#%.E|
00000010 8e 2e d1 a0 c4 42 b1 31 9c ad b6 ee 0f 8a 0c 6e |.....B.1.......n|
00000020 af 94 8c c3 02 20 7c ea 7a 1b 9b f7 16 58 87 11 |..... |.z....X..|
00000030 18 67 64 34 a9 c9 ee a0 75 82 69 ce 7d 1a 65 b7 |.gd4....u.i.}.e.|
00000040 ba 0b 1d f9 5b f2 |....[.|
[9270 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9271 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042709d0 gate 1578074257432701400 evaluation starts
[9272 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042709d0 signed by 0 principal evaluation starts (used [false])
[9273 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042709d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9274 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042709d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9275 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042709d0 principal evaluation fails
[9276 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042709d0 gate 1578074257432701400 evaluation fails
[9277 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9278 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9279 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[927a 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 4b bd 3f 8d 5a 49 fc 60 a2 40 22 21 b4 8a bc |.K.?.ZI.`.@"!...|
00000010 b1 94 06 5a 73 ae 55 16 c3 38 15 6c 24 8b 49 68 |...Zs.U..8.l$.Ih|
[927b 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 79 c2 20 1d 93 93 72 23 25 11 45 |0D. py. ...r#%.E|
00000010 8e 2e d1 a0 c4 42 b1 31 9c ad b6 ee 0f 8a 0c 6e |.....B.1.......n|
00000020 af 94 8c c3 02 20 7c ea 7a 1b 9b f7 16 58 87 11 |..... |.z....X..|
00000030 18 67 64 34 a9 c9 ee a0 75 82 69 ce 7d 1a 65 b7 |.gd4....u.i.}.e.|
00000040 ba 0b 1d f9 5b f2 |....[.|
[927c 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[927d 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042712d0 gate 1578074257433102500 evaluation starts
[927e 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042712d0 signed by 0 principal evaluation starts (used [false])
[927f 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042712d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9280 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042712d0 principal evaluation succeeds for identity 0
[9281 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042712d0 gate 1578074257433102500 evaluation succeeds
[9282 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9283 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9284 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9285 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9286 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes
[9287 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9288 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[9289 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 a6 d3 c0 8a c3 af 23 e2 b6 c3 e2 51 eb 63 b1 |.......#....Q.c.|
00000010 11 5d 54 76 ba 4b 6d 5c ad 1b f3 51 ea b7 71 64 |.]Tv.Km\...Q..qd|
[928a 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 bb 56 78 be 4f da 0a dd 43 8a f3 |0D. 0.Vx.O...C..|
00000010 d3 5f a3 9a c9 b8 df 55 d4 9c 74 d0 32 f6 da 37 |._.....U..t.2..7|
00000020 11 b8 75 11 02 20 5d 45 4c 0a dc ea 02 8f a6 3a |..u.. ]EL......:|
00000030 72 ab b2 40 c7 c9 e7 79 90 e3 ac 40 a7 15 39 00 |r..@...y...@..9.|
00000040 1c 03 36 d8 b4 89 |..6...|
[928b 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes
[928c 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes
[928d 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[928e 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[928f 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[9290 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[9291 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[9292 01-03 17:57:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9293 01-03 17:57:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[9294 01-03 17:57:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9295 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[9296 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[9297 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9298 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[9299 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[929a 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 a6 d3 c0 8a c3 af 23 e2 b6 c3 e2 51 eb 63 b1 |.......#....Q.c.|
00000010 11 5d 54 76 ba 4b 6d 5c ad 1b f3 51 ea b7 71 64 |.]Tv.Km\...Q..qd|
[929b 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 bb 56 78 be 4f da 0a dd 43 8a f3 |0D. 0.Vx.O...C..|
00000010 d3 5f a3 9a c9 b8 df 55 d4 9c 74 d0 32 f6 da 37 |._.....U..t.2..7|
00000020 11 b8 75 11 02 20 5d 45 4c 0a dc ea 02 8f a6 3a |..u.. ]EL......:|
00000030 72 ab b2 40 c7 c9 e7 79 90 e3 ac 40 a7 15 39 00 |r..@...y...@..9.|
00000040 1c 03 36 d8 b4 89 |..6...|
[929c 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[929d 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 fd bf be 03 27 69 17 3e cc bf f4 |0D. `....'i.>...|
00000010 e2 59 28 2a 5b 9f 02 19 b4 7a e6 db ef c0 2d 45 |.Y(*[....z....-E|
00000020 84 48 7d ef 02 20 1d fb 9b 3c 7e e6 b7 17 74 04 |.H}.. ...<~...t.|
00000030 54 88 1b c8 af ed e7 a0 26 9a 82 d0 61 5c a5 1a |T.......&...a\..|
00000040 83 e0 b4 ac fc 05 |......|
[929e 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[929f 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[92a0 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[92a1 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92a2 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92a3 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[92a4 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[92a5 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 a6 d3 c0 8a c3 af 23 e2 b6 c3 e2 51 eb 63 b1 |.......#....Q.c.|
00000010 11 5d 54 76 ba 4b 6d 5c ad 1b f3 51 ea b7 71 64 |.]Tv.Km\...Q..qd|
[92a6 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 bb 56 78 be 4f da 0a dd 43 8a f3 |0D. 0.Vx.O...C..|
00000010 d3 5f a3 9a c9 b8 df 55 d4 9c 74 d0 32 f6 da 37 |._.....U..t.2..7|
00000020 11 b8 75 11 02 20 5d 45 4c 0a dc ea 02 8f a6 3a |..u.. ]EL......:|
00000030 72 ab b2 40 c7 c9 e7 79 90 e3 ac 40 a7 15 39 00 |r..@...y...@..9.|
00000040 1c 03 36 d8 b4 89 |..6...|
[92a7 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92a8 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes
[92a9 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:97 , Envelope: 83 bytes, Signature: 70 bytes
[92aa 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92ab 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[92ac 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92ad 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[92ae 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[92af 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[92b0 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[92b1 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[92b2 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[92b3 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 ef 2d 1f ad a0 9d 47 41 90 1f 49 20 c6 f7 3d |X.-....GA..I ..=|
00000010 26 e1 79 48 a1 70 38 a5 e0 5b 82 66 d1 ed 68 2c |&.yH.p8..[.f..h,|
[92b4 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 2a 40 43 0b 4a e2 5d 94 7a 97 |0E.!..*@C.J.].z.|
00000010 1d 98 4d 08 ae 05 52 b3 ce 99 49 be bd 22 67 2b |..M...R...I.."g+|
00000020 49 20 49 55 f8 02 20 25 ad 98 e9 02 82 14 10 b3 |I IU.. %........|
00000030 db bf 30 8e b8 77 2c be e7 de 7c f4 68 bb ad 3c |..0..w,...|.h..<|
00000040 8d 1a 7b 0c 93 47 ca |..{..G.|
[92b5 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[92b6 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2260 gate 1578074257454636700 evaluation starts
[92b7 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2260 signed by 0 principal evaluation starts (used [false])
[92b8 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2260 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[92b9 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[92ba 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2260 principal evaluation fails
[92bb 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2260 gate 1578074257454636700 evaluation fails
[92bc 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[92bd 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[92be 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[92bf 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 ef 2d 1f ad a0 9d 47 41 90 1f 49 20 c6 f7 3d |X.-....GA..I ..=|
00000010 26 e1 79 48 a1 70 38 a5 e0 5b 82 66 d1 ed 68 2c |&.yH.p8..[.f..h,|
[92c0 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 2a 40 43 0b 4a e2 5d 94 7a 97 |0E.!..*@C.J.].z.|
00000010 1d 98 4d 08 ae 05 52 b3 ce 99 49 be bd 22 67 2b |..M...R...I.."g+|
00000020 49 20 49 55 f8 02 20 25 ad 98 e9 02 82 14 10 b3 |I IU.. %........|
00000030 db bf 30 8e b8 77 2c be e7 de 7c f4 68 bb ad 3c |..0..w,...|.h..<|
00000040 8d 1a 7b 0c 93 47 ca |..{..G.|
[92c1 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[92c2 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2b60 gate 1578074257455615000 evaluation starts
[92c3 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2b60 signed by 0 principal evaluation starts (used [false])
[92c4 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2b60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[92c5 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[92c6 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2b60 principal evaluation fails
[92c7 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd2b60 gate 1578074257455615000 evaluation fails
[92c8 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[92c9 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[92ca 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[92cb 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 ef 2d 1f ad a0 9d 47 41 90 1f 49 20 c6 f7 3d |X.-....GA..I ..=|
00000010 26 e1 79 48 a1 70 38 a5 e0 5b 82 66 d1 ed 68 2c |&.yH.p8..[.f..h,|
[92cc 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 2a 40 43 0b 4a e2 5d 94 7a 97 |0E.!..*@C.J.].z.|
00000010 1d 98 4d 08 ae 05 52 b3 ce 99 49 be bd 22 67 2b |..M...R...I.."g+|
00000020 49 20 49 55 f8 02 20 25 ad 98 e9 02 82 14 10 b3 |I IU.. %........|
00000030 db bf 30 8e b8 77 2c be e7 de 7c f4 68 bb ad 3c |..0..w,...|.h..<|
00000040 8d 1a 7b 0c 93 47 ca |..{..G.|
[92cd 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[92ce 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd34e0 gate 1578074257456259600 evaluation starts
[92cf 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd34e0 signed by 0 principal evaluation starts (used [false])
[92d0 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd34e0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[92d1 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd34e0 principal evaluation succeeds for identity 0
[92d2 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd34e0 gate 1578074257456259600 evaluation succeeds
[92d3 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[92d4 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[92d5 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[92d6 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[92d7 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes
[92d8 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92d9 01-03 17:57:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92da 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92db 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92dc 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[92dd 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92de 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92df 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11060624157702082081 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[92e0 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11060624157702082081 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[92e1 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92e2 01-03 17:57:37.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11060624157702082081 , Msg_type: BLOCK_MSG, digests: [9 2 4 5 6 1 3 7 8], Envelope: 61 bytes, Signature: 0 bytes
[92e3 01-03 17:57:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11060624157702082081 , Msg_type: BLOCK_MSG, digests: [9 2 4 5 6 1 3 7 8], Envelope: 61 bytes, Signature: 0 bytes
[92e4 01-03 17:57:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11060624157702082081 , Msg_type: BLOCK_MSG, digests: [9 2 4 5 6 1 3 7 8], Envelope: 61 bytes, Signature: 0 bytes
[92e5 01-03 17:57:37.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92e6 01-03 17:57:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[92e7 01-03 17:57:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[92e8 01-03 17:57:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92e9 01-03 17:57:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92ea 01-03 17:57:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92eb 01-03 17:57:37.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16060689946072215973 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[92ec 01-03 17:57:37.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16060689946072215973 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[92ed 01-03 17:57:37.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16060689946072215973 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[92ee 01-03 17:57:37.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [9 1 5 7 8 2 3 4 6] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[92ef 01-03 17:57:37.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92f0 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[92f1 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92f2 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[92f3 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[92f4 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92f5 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[92f6 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[92f7 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[92f8 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[92f9 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[92fa 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[92fb 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 1c 35 7f b6 1f 53 de fa f2 aa cb c4 41 0c a7 |..5...S......A..|
00000010 03 2b 15 4e bf fd f0 05 f4 f2 fd 08 bf 3a 51 8b |.+.N.........:Q.|
[92fc 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 91 74 79 b2 70 93 82 0f 9d 9a |0E.!...ty.p.....|
00000010 3f d4 46 67 7d ae ed 14 39 c8 df 03 25 e8 bc 89 |?.Fg}...9...%...|
00000020 a4 2f e7 f9 2d 02 20 1d 51 af c6 f3 62 e5 6c 40 |./..-. .Q...b.l@|
00000030 8f 20 45 1e 6d ed f9 a3 e1 96 64 e6 88 aa 32 79 |. E.m.....d...2y|
00000040 ad 7a 70 2b b8 df ad |.zp+...|
[92fd 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[92fe 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9ddd0 gate 1578074257976637400 evaluation starts
[92ff 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9ddd0 signed by 0 principal evaluation starts (used [false])
[9300 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9ddd0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9301 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9ddd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[9302 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9ddd0 principal evaluation fails
[9303 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9ddd0 gate 1578074257976637400 evaluation fails
[9304 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9305 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9306 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9307 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[9308 01-03 17:57:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 1c 35 7f b6 1f 53 de fa f2 aa cb c4 41 0c a7 |..5...S......A..|
00000010 03 2b 15 4e bf fd f0 05 f4 f2 fd 08 bf 3a 51 8b |.+.N.........:Q.|
[9309 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 91 74 79 b2 70 93 82 0f 9d 9a |0E.!...ty.p.....|
00000010 3f d4 46 67 7d ae ed 14 39 c8 df 03 25 e8 bc 89 |?.Fg}...9...%...|
00000020 a4 2f e7 f9 2d 02 20 1d 51 af c6 f3 62 e5 6c 40 |./..-. .Q...b.l@|
00000030 8f 20 45 1e 6d ed f9 a3 e1 96 64 e6 88 aa 32 79 |. E.m.....d...2y|
00000040 ad 7a 70 2b b8 df ad |.zp+...|
[930a 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[930b 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c700 gate 1578074257981746400 evaluation starts
[930c 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c700 signed by 0 principal evaluation starts (used [false])
[930d 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c700 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[930e 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[930f 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c700 principal evaluation fails
[9310 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c700 gate 1578074257981746400 evaluation fails
[9311 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9312 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9313 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9314 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 1c 35 7f b6 1f 53 de fa f2 aa cb c4 41 0c a7 |..5...S......A..|
00000010 03 2b 15 4e bf fd f0 05 f4 f2 fd 08 bf 3a 51 8b |.+.N.........:Q.|
[9315 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 91 74 79 b2 70 93 82 0f 9d 9a |0E.!...ty.p.....|
00000010 3f d4 46 67 7d ae ed 14 39 c8 df 03 25 e8 bc 89 |?.Fg}...9...%...|
00000020 a4 2f e7 f9 2d 02 20 1d 51 af c6 f3 62 e5 6c 40 |./..-. .Q...b.l@|
00000030 8f 20 45 1e 6d ed f9 a3 e1 96 64 e6 88 aa 32 79 |. E.m.....d...2y|
00000040 ad 7a 70 2b b8 df ad |.zp+...|
[9316 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9317 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5d000 gate 1578074257982279900 evaluation starts
[9318 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5d000 signed by 0 principal evaluation starts (used [false])
[9319 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5d000 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[931a 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5d000 principal evaluation succeeds for identity 0
[931b 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5d000 gate 1578074257982279900 evaluation succeeds
[931c 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[931d 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[931e 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[931f 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9320 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[9321 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes]}
[9322 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99
[9323 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99
[9324 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[9325 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9326 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9327 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9329 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[932a 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9328 01-03 17:57:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[932b 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[932c 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[932d 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[932e 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[932f 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9330 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9331 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9332 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9333 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9334 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9335 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9336 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[9337 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9338 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9339 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[933a 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[933b 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[933c 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[933d 01-03 17:57:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[933e 01-03 17:57:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[933f 01-03 17:57:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9340 01-03 17:57:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9341 01-03 17:57:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9342 01-03 17:57:38.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9343 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[9344 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9345 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[9346 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[9347 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9348 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[9349 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[934a 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[934b 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[934c 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[934d 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[934e 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[934f 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9350 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 bb 92 5d 4c 58 b2 49 05 b6 3d c3 78 9e 96 9d |...]LX.I..=.x...|
00000010 92 95 cf 88 41 e4 55 f0 e0 34 21 02 1b 9c e4 f6 |....A.U..4!.....|
[9351 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 05 cb 00 f5 ff dc c1 8b 8f 21 ee |0D. 2.........!.|
00000010 6f 8d 86 28 99 a1 b9 a9 e3 94 9e fa 8f 30 8a d3 |o..(.........0..|
00000020 11 fc db 39 02 20 06 51 76 32 d5 d9 68 5a 3b 50 |...9. .Qv2..hZ;P|
00000030 7e 37 e5 ca 79 c5 40 be f4 e4 27 f1 c9 07 27 c1 |~7..y.@...'...'.|
00000040 9b 88 f3 71 34 51 |...q4Q|
[9352 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9353 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2d660 gate 1578074258095919200 evaluation starts
[9354 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2d660 signed by 0 principal evaluation starts (used [false])
[9355 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2d660 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9356 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2d660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[9357 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2d660 principal evaluation fails
[9358 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2d660 gate 1578074258095919200 evaluation fails
[9359 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[935a 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[935b 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[935c 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 bb 92 5d 4c 58 b2 49 05 b6 3d c3 78 9e 96 9d |...]LX.I..=.x...|
00000010 92 95 cf 88 41 e4 55 f0 e0 34 21 02 1b 9c e4 f6 |....A.U..4!.....|
[935d 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 05 cb 00 f5 ff dc c1 8b 8f 21 ee |0D. 2.........!.|
00000010 6f 8d 86 28 99 a1 b9 a9 e3 94 9e fa 8f 30 8a d3 |o..(.........0..|
00000020 11 fc db 39 02 20 06 51 76 32 d5 d9 68 5a 3b 50 |...9. .Qv2..hZ;P|
00000030 7e 37 e5 ca 79 c5 40 be f4 e4 27 f1 c9 07 27 c1 |~7..y.@...'...'.|
00000040 9b 88 f3 71 34 51 |...q4Q|
[935e 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[935f 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2df60 gate 1578074258096343600 evaluation starts
[9360 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2df60 signed by 0 principal evaluation starts (used [false])
[9361 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2df60 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9362 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2df60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9363 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2df60 principal evaluation fails
[9364 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2df60 gate 1578074258096343600 evaluation fails
[9365 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9366 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9367 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9368 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 bb 92 5d 4c 58 b2 49 05 b6 3d c3 78 9e 96 9d |...]LX.I..=.x...|
00000010 92 95 cf 88 41 e4 55 f0 e0 34 21 02 1b 9c e4 f6 |....A.U..4!.....|
[9369 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 05 cb 00 f5 ff dc c1 8b 8f 21 ee |0D. 2.........!.|
00000010 6f 8d 86 28 99 a1 b9 a9 e3 94 9e fa 8f 30 8a d3 |o..(.........0..|
00000020 11 fc db 39 02 20 06 51 76 32 d5 d9 68 5a 3b 50 |...9. .Qv2..hZ;P|
00000030 7e 37 e5 ca 79 c5 40 be f4 e4 27 f1 c9 07 27 c1 |~7..y.@...'...'.|
00000040 9b 88 f3 71 34 51 |...q4Q|
[936a 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[936b 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8860 gate 1578074258096754400 evaluation starts
[936c 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8860 signed by 0 principal evaluation starts (used [false])
[936d 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8860 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[936e 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8860 principal evaluation succeeds for identity 0
[936f 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8860 gate 1578074258096754400 evaluation succeeds
[9370 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9371 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9372 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9373 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9374 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[9375 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes]}
[9376 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103
[9377 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103
[9378 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[9379 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[937a 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[937b 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[937c 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[937d 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[937e 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[937f 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9380 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9381 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9382 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9383 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9384 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9385 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9386 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[9387 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9388 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[9389 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[938a 01-03 17:57:38.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[938b 01-03 17:57:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[938c 01-03 17:57:38.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[938d 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151062
[938e 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CF20B9F880308DA65C1533DC8E5A9A45096A26A6D6D0FFD6B708D96298AEAD2
[938f 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[9390 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[9391 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[9392 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9393 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9394 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9395 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[9396 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9397 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[9398 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[9399 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[939a 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[939b 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[939c 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[939d 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:98 , Envelope: 83 bytes, Signature: 71 bytes
[939e 01-03 17:57:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[939f 01-03 17:57:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes
[93a0 01-03 17:57:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93a1 01-03 17:57:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93a2 01-03 17:57:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93a3 01-03 17:57:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93a4 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57734
[93a5 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU d4e6c80ba305925bf0290bd34ed2116444c63edbbb8286e78bc09c7210ae3101 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[93a6 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU d4e6c80ba305925bf0290bd34ed2116444c63edbbb8286e78bc09c7210ae3101 creator is valid
[93a7 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 71 52 ac 21 57 71 fa 33 07 18 0c dd db b0 8c |.qR.!Wq.3.......|
00000010 22 5b ff ca 9d 69 a2 2d ca 99 7b fc 00 fe b5 2b |"[...i.-..{....+|
[93a8 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 1e 40 96 96 a0 3c 0c e1 7b 0f |0E.!...@...<..{.|
00000010 6d 69 e0 84 02 ec 1d 0e f5 5a 8a b6 f9 ad d2 af |mi.......Z......|
00000020 bc 3b c8 0e 3c 02 20 5c cb 63 4a 6e e4 c5 ee 5a |.;..<. \.cJn...Z|
00000030 31 fc 38 4d 60 65 3e da 0d 44 f2 ce 49 0f 8e 89 |1.8M`e>..D..I...|
00000040 54 5b b2 60 c7 9b 46 |T[.`..F|
[93a9 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU d4e6c80ba305925bf0290bd34ed2116444c63edbbb8286e78bc09c7210ae3101 signature is valid
[93aa 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU [][d4e6c80b] processing txid: d4e6c80ba305925bf0290bd34ed2116444c63edbbb8286e78bc09c7210ae3101
[93ab 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU [][d4e6c80b] Entry chaincode: cscc
[93ac 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> INFO [][d4e6c80b] Entry chaincode: cscc
[93ad 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU [d4e6c80b] getting chaincode data for cscc on channel
[93ae 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[93af 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels
[93b0 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 71 52 ac 21 57 71 fa 33 07 18 0c dd db b0 8c |.qR.!Wq.3.......|
00000010 22 5b ff ca 9d 69 a2 2d ca 99 7b fc 00 fe b5 2b |"[...i.-..{....+|
[93b1 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 1e 40 96 96 a0 3c 0c e1 7b 0f |0E.!...@...<..{.|
00000010 6d 69 e0 84 02 ec 1d 0e f5 5a 8a b6 f9 ad d2 af |mi.......Z......|
00000020 bc 3b c8 0e 3c 02 20 5c cb 63 4a 6e e4 c5 ee 5a |.;..<. \.cJn...Z|
00000030 31 fc 38 4d 60 65 3e da 0d 44 f2 ce 49 0f 8e 89 |1.8M`e>..D..I...|
00000040 54 5b b2 60 c7 9b 46 |T[.`..F|
[93b2 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU [d4e6c80b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[93b3 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU [d4e6c80b] notifying Txid:d4e6c80ba305925bf0290bd34ed2116444c63edbbb8286e78bc09c7210ae3101, channelID:
[93b4 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[93b5 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> INFO [][d4e6c80b] Exit chaincode: cscc (1ms)
[93b6 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU [][d4e6c80b] Exit
[93b7 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57734
[93b8 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57734 grpc.code=OK grpc.call_duration=3.074ms
[93b9 01-03 17:57:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[93ba 01-03 17:57:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5650586558646737179 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[93bb 01-03 17:57:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[93bc 01-03 17:57:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello:<nonce:5650586558646737179 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[93bd 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5650586558646737179 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[93be 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[93bf 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93c0 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[93c1 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93c2 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[93c3 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[93c4 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 c0 d0 e5 16 49 22 a2 31 12 41 e6 74 4b ff 82 |d....I".1.A.tK..|
00000010 76 bf 9e f4 54 da 09 d9 7a b9 06 ed 47 c0 50 27 |v...T...z...G.P'|
[93c5 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 ce 14 d1 64 2a 43 cd 24 dd 28 |0E.!.....d*C.$.(|
00000010 f1 1d 27 8b 58 d4 48 91 11 28 53 6c 83 13 99 9b |..'.X.H..(Sl....|
00000020 9f 66 88 97 24 02 20 41 d8 c6 c6 ea 79 35 1f c5 |.f..$. A....y5..|
00000030 40 3c 17 c8 e2 fd b5 68 2e 0d 7f 09 58 73 31 66 |@<.....h....Xs1f|
00000040 d1 2d 82 1a 4f 4f 98 |.-..OO.|
[93c6 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[93c7 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 4a 54 ca 00 90 36 fb 6f bc 4c |0E.!..JT...6.o.L|
00000010 b5 71 17 25 3e 68 6b 6a fb 2b f5 5b 19 d0 36 d4 |.q.%>hkj.+.[..6.|
00000020 1d 50 cb e3 cd 02 20 7b ab f7 77 b6 25 8f 9a ab |.P.... {..w.%...|
00000030 26 83 cd 9a 15 ca 99 7a 50 67 83 21 48 ac c5 95 |&......zPg.!H...|
00000040 47 e0 0c bd b8 ae 30 |G.....0|
[93c8 01-03 17:57:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[93c9 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[93ca 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104
[93cb 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104
[93cc 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[93cd 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ce 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93cf 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[93d0 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93d1 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93d2 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93d3 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[93d4 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[93d5 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[93d6 01-03 17:57:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93d7 01-03 17:57:41.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello:<nonce:7392610294503938799 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[93d8 01-03 17:57:41.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7392610294503938799 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[93d9 01-03 17:57:41.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93da 01-03 17:57:41.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93db 01-03 17:57:41.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93dc 01-03 17:57:41.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93dd 01-03 17:57:41.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93de 01-03 17:57:41.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93df 01-03 17:57:41.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[93e0 01-03 17:57:41.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93e1 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello:<nonce:3070008576443310255 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[93e2 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3070008576443310255 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[93e3 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93e4 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93e5 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93e6 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93e7 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93e8 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93e9 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[93ea 01-03 17:57:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93eb 01-03 17:57:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[93ec 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ed 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[93ee 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[93ef 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93f0 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[93f1 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[93f2 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[93f3 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[93f4 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[93f5 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[93f6 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 9d bb 36 e5 df 60 73 67 d9 87 a4 fa b9 4c 0e |...6..`sg.....L.|
00000010 77 87 4c 89 39 fe 6a 08 13 9d 44 6c c8 f2 49 08 |w.L.9.j...Dl..I.|
[93f7 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 62 54 e2 b1 e1 f7 1c 7b cd 78 |0E.!..bT.....{.x|
00000010 0e 03 00 3b 14 31 4f 62 0a 1a ca 8c 3a 92 2f 8b |...;.1Ob....:./.|
00000020 62 ce 4e 96 d1 02 20 06 91 16 11 5f 7f bc 5a 40 |b.N... ...._..Z@|
00000030 b4 87 85 f7 c1 c9 d2 77 c4 2c 2f 76 b7 96 17 82 |.......w.,/v....|
00000040 5c 10 61 4c ae d6 ac |\.aL...|
[93f8 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[93f9 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c50 gate 1578074261188008100 evaluation starts
[93fa 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c50 signed by 0 principal evaluation starts (used [false])
[93fb 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[93fc 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[93fd 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c50 principal evaluation fails
[93fe 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb6c50 gate 1578074261188008100 evaluation fails
[93ff 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9400 01-03 17:57:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9401 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9402 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 9d bb 36 e5 df 60 73 67 d9 87 a4 fa b9 4c 0e |...6..`sg.....L.|
00000010 77 87 4c 89 39 fe 6a 08 13 9d 44 6c c8 f2 49 08 |w.L.9.j...Dl..I.|
[9403 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 62 54 e2 b1 e1 f7 1c 7b cd 78 |0E.!..bT.....{.x|
00000010 0e 03 00 3b 14 31 4f 62 0a 1a ca 8c 3a 92 2f 8b |...;.1Ob....:./.|
00000020 62 ce 4e 96 d1 02 20 06 91 16 11 5f 7f bc 5a 40 |b.N... ...._..Z@|
00000030 b4 87 85 f7 c1 c9 d2 77 c4 2c 2f 76 b7 96 17 82 |.......w.,/v....|
00000040 5c 10 61 4c ae d6 ac |\.aL...|
[9404 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9405 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7550 gate 1578074261192456300 evaluation starts
[9406 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7550 signed by 0 principal evaluation starts (used [false])
[9407 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7550 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9408 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9409 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7550 principal evaluation fails
[940a 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7550 gate 1578074261192456300 evaluation fails
[940b 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[940c 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[940d 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[940e 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 9d bb 36 e5 df 60 73 67 d9 87 a4 fa b9 4c 0e |...6..`sg.....L.|
00000010 77 87 4c 89 39 fe 6a 08 13 9d 44 6c c8 f2 49 08 |w.L.9.j...Dl..I.|
[940f 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 62 54 e2 b1 e1 f7 1c 7b cd 78 |0E.!..bT.....{.x|
00000010 0e 03 00 3b 14 31 4f 62 0a 1a ca 8c 3a 92 2f 8b |...;.1Ob....:./.|
00000020 62 ce 4e 96 d1 02 20 06 91 16 11 5f 7f bc 5a 40 |b.N... ...._..Z@|
00000030 b4 87 85 f7 c1 c9 d2 77 c4 2c 2f 76 b7 96 17 82 |.......w.,/v....|
00000040 5c 10 61 4c ae d6 ac |\.aL...|
[9410 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9411 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7e50 gate 1578074261194564600 evaluation starts
[9412 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7e50 signed by 0 principal evaluation starts (used [false])
[9413 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7e50 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9414 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7e50 principal evaluation succeeds for identity 0
[9415 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bb7e50 gate 1578074261194564600 evaluation succeeds
[9416 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9417 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9418 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9419 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[941a 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes
[941b 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes]}
[941c 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:104
[941d 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:104
[941e 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[941f 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9420 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9421 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9422 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd
[9423 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9424 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9425 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9426 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers
[9427 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[9428 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[9429 01-03 17:57:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[942a 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[942b 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[942c 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[942d 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[942e 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[942f 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9430 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9431 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9432 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9433 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9434 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9435 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 dd c4 ed 0e 1e 18 ea 5b f7 ba 8b 8a bd bd 25 |........[......%|
00000010 e6 3b db 7c 97 10 9c 33 28 bd 06 5c 09 4e 6f c1 |.;.|...3(..\.No.|
[9436 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb c7 d8 40 88 92 fe 63 d8 d0 9f |0E.!....@...c...|
00000010 29 b0 2c 05 30 31 48 64 b3 79 5f 82 8c a1 6e 40 |).,.01Hd.y_...n@|
00000020 46 f3 de 0a 8c 02 20 08 af ed fb dd 75 84 50 85 |F..... .....u.P.|
00000030 99 3c d5 33 4e 87 95 d0 fc 29 2b 7d fa 4c 3f 9b |.<.3N....)+}.L?.|
00000040 93 79 72 c5 fb cf 4c |.yr...L|
[9437 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9438 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6c270 gate 1578074261233111100 evaluation starts
[9439 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6c270 signed by 0 principal evaluation starts (used [false])
[943a 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6c270 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[943b 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6c270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[943c 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6c270 principal evaluation fails
[943d 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6c270 gate 1578074261233111100 evaluation fails
[943e 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[943f 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9440 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9441 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 dd c4 ed 0e 1e 18 ea 5b f7 ba 8b 8a bd bd 25 |........[......%|
00000010 e6 3b db 7c 97 10 9c 33 28 bd 06 5c 09 4e 6f c1 |.;.|...3(..\.No.|
[9442 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb c7 d8 40 88 92 fe 63 d8 d0 9f |0E.!....@...c...|
00000010 29 b0 2c 05 30 31 48 64 b3 79 5f 82 8c a1 6e 40 |).,.01Hd.y_...n@|
00000020 46 f3 de 0a 8c 02 20 08 af ed fb dd 75 84 50 85 |F..... .....u.P.|
00000030 99 3c d5 33 4e 87 95 d0 fc 29 2b 7d fa 4c 3f 9b |.<.3N....)+}.L?.|
00000040 93 79 72 c5 fb cf 4c |.yr...L|
[9443 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9444 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6cb70 gate 1578074261234356200 evaluation starts
[9445 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6cb70 signed by 0 principal evaluation starts (used [false])
[9446 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6cb70 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9447 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6cb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9448 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6cb70 principal evaluation fails
[9449 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6cb70 gate 1578074261234356200 evaluation fails
[944a 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[944b 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[944c 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[944d 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 dd c4 ed 0e 1e 18 ea 5b f7 ba 8b 8a bd bd 25 |........[......%|
00000010 e6 3b db 7c 97 10 9c 33 28 bd 06 5c 09 4e 6f c1 |.;.|...3(..\.No.|
[944e 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb c7 d8 40 88 92 fe 63 d8 d0 9f |0E.!....@...c...|
00000010 29 b0 2c 05 30 31 48 64 b3 79 5f 82 8c a1 6e 40 |).,.01Hd.y_...n@|
00000020 46 f3 de 0a 8c 02 20 08 af ed fb dd 75 84 50 85 |F..... .....u.P.|
00000030 99 3c d5 33 4e 87 95 d0 fc 29 2b 7d fa 4c 3f 9b |.<.3N....)+}.L?.|
00000040 93 79 72 c5 fb cf 4c |.yr...L|
[944f 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9450 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d490 gate 1578074261234910100 evaluation starts
[9451 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d490 signed by 0 principal evaluation starts (used [false])
[9452 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d490 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9453 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d490 principal evaluation succeeds for identity 0
[9454 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a6d490 gate 1578074261234910100 evaluation succeeds
[9455 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9456 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9457 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9458 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9459 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[945a 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes]}
[945b 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:100
[945c 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:100
[945d 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[945e 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[945f 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9460 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9461 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030
[9462 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9463 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9464 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9465 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers
[9466 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[9467 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[9468 01-03 17:57:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9469 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[946a 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16079858508406343169 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[946b 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[946c 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16079858508406343169 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[946d 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[946e 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:198110229604777727 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[946f 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[9470 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5613212813379141614 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[9472 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5613212813379141614 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9473 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9471 01-03 17:57:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:198110229604777727 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9475 01-03 17:57:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9476 01-03 17:57:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5613212813379141614 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[9474 01-03 17:57:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16079858508406343169 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[9477 01-03 17:57:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16079858508406343169 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes
[9478 01-03 17:57:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9479 01-03 17:57:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5613212813379141614 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[947a 01-03 17:57:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5613212813379141614 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes
[947b 01-03 17:57:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[947c 01-03 17:57:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 198110229604777727 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[947d 01-03 17:57:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 198110229604777727 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes
[947e 01-03 17:57:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[947f 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:57742
[9480 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU 2a8a90aa3343431c9d0ea35211d34ccaf74e64195d97350d5cef9d778057b10a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[9481 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU 2a8a90aa3343431c9d0ea35211d34ccaf74e64195d97350d5cef9d778057b10a creator is valid
[9482 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 8a bf 84 13 e6 35 aa 8a 69 12 13 c0 8b 00 eb |......5..i......|
00000010 25 d3 ef 20 12 c5 4b 0d 18 68 1b 9c dc cc 5a 34 |%.. ..K..h....Z4|
[9483 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 74 37 48 89 bf 18 39 b7 0d 75 83 |0D. .t7H...9..u.|
00000010 4c 08 fe 50 83 d4 9e 2d 13 d8 6e 55 85 7e e1 2d |L..P...-..nU.~.-|
00000020 61 d5 a0 73 02 20 71 e2 3a da 48 fa cf 55 60 14 |a..s. q.:.H..U`.|
00000030 e9 6c ed 65 f2 06 30 95 e4 0b de b8 9d 6a 0c 79 |.l.e..0......j.y|
00000040 01 10 69 fe ca 58 |..i..X|
[9484 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU 2a8a90aa3343431c9d0ea35211d34ccaf74e64195d97350d5cef9d778057b10a signature is valid
[9485 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU [][2a8a90aa] processing txid: 2a8a90aa3343431c9d0ea35211d34ccaf74e64195d97350d5cef9d778057b10a
[9486 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU [][2a8a90aa] Entry chaincode: qscc
[9487 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> INFO [][2a8a90aa] Entry chaincode: qscc
[9488 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU [2a8a90aa] getting chaincode data for qscc on channel
[9489 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[948a 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel
[948b 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo
[948c 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[948d 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[948e 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[948f 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9490 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9491 01-03 17:57:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[9492 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 8a bf 84 13 e6 35 aa 8a 69 12 13 c0 8b 00 eb |......5..i......|
00000010 25 d3 ef 20 12 c5 4b 0d 18 68 1b 9c dc cc 5a 34 |%.. ..K..h....Z4|
[9493 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 74 37 48 89 bf 18 39 b7 0d 75 83 |0D. .t7H...9..u.|
00000010 4c 08 fe 50 83 d4 9e 2d 13 d8 6e 55 85 7e e1 2d |L..P...-..nU.~.-|
00000020 61 d5 a0 73 02 20 71 e2 3a da 48 fa cf 55 60 14 |a..s. q.:.H..U`.|
00000030 e9 6c ed 65 f2 06 30 95 e4 0b de b8 9d 6a 0c 79 |.l.e..0......j.y|
00000040 01 10 69 fe ca 58 |..i..X|
[9494 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9495 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b90c0 gate 1578074261292730900 evaluation starts
[9496 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b90c0 signed by 0 principal evaluation starts (used [false])
[9497 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b90c0 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[9498 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b90c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)
[9499 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b90c0 principal evaluation fails
[949a 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b90c0 gate 1578074261292730900 evaluation fails
[949b 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[949c 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[949d 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[949e 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 8a bf 84 13 e6 35 aa 8a 69 12 13 c0 8b 00 eb |......5..i......|
00000010 25 d3 ef 20 12 c5 4b 0d 18 68 1b 9c dc cc 5a 34 |%.. ..K..h....Z4|
[949f 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 74 37 48 89 bf 18 39 b7 0d 75 83 |0D. .t7H...9..u.|
00000010 4c 08 fe 50 83 d4 9e 2d 13 d8 6e 55 85 7e e1 2d |L..P...-..nU.~.-|
00000020 61 d5 a0 73 02 20 71 e2 3a da 48 fa cf 55 60 14 |a..s. q.:.H..U`.|
00000030 e9 6c ed 65 f2 06 30 95 e4 0b de b8 9d 6a 0c 79 |.l.e..0......j.y|
00000040 01 10 69 fe ca 58 |..i..X|
[94a0 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[94a1 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4300 gate 1578074261295234700 evaluation starts
[94a2 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4300 signed by 0 principal evaluation starts (used [false])
[94a3 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4300 processing identity 0 - &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}
[94a4 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[94a5 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[94a6 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[94a7 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4300 principal evaluation succeeds for identity 0
[94a8 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029b4300 gate 1578074261295234700 evaluation succeeds
[94a9 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[94aa 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[94ab 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[94ac 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[94ad 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU [2a8a90aa] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[94ae 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU [2a8a90aa] notifying Txid:2a8a90aa3343431c9d0ea35211d34ccaf74e64195d97350d5cef9d778057b10a, channelID:
[94af 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[94b0 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> INFO [][2a8a90aa] Exit chaincode: qscc (14ms)
[94b1 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU [][2a8a90aa] Exit
[94b2 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:57742
[94b3 01-03 17:57:41.29 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:57742 grpc.code=OK grpc.call_duration=15.5566ms
[94b4 01-03 17:57:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[94b5 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94b6 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94b7 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[94b8 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[94b9 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[94bb 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94bc 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94ba 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes
[94bd 01-03 17:57:41.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94be 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[94bf 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[94c0 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[94c1 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[94c2 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[94c3 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[94c4 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94c5 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94c6 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[94c7 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[94c8 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[94c9 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[94ca 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[94cb 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[94cc 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[94cd 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[94ce 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[94cf 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bbb0 gate 1578074261375648200 evaluation starts
[94d0 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bbb0 signed by 0 principal evaluation starts (used [false])
[94d1 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bbb0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[94d2 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[94d3 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bbb0 principal evaluation fails
[94d4 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299bbb0 gate 1578074261375648200 evaluation fails
[94d5 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[94d6 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[94d7 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[94d8 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[94d9 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[94da 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[94db 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a1d0 gate 1578074261379061100 evaluation starts
[94dc 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a1d0 signed by 0 principal evaluation starts (used [false])
[94dd 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a1d0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[94de 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a1d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[94df 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a1d0 principal evaluation fails
[94e0 01-03 17:57:41.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a1d0 gate 1578074261379061100 evaluation fails
[94e1 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[94e2 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[94e3 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[94e4 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[94e5 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[94e6 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[94e7 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039aae0 gate 1578074261381627300 evaluation starts
[94e8 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039aae0 signed by 0 principal evaluation starts (used [false])
[94e9 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039aae0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[94ea 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039aae0 principal evaluation succeeds for identity 0
[94eb 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039aae0 gate 1578074261381627300 evaluation succeeds
[94ec 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[94ed 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[94ee 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[94ef 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[94f0 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94f1 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94f2 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[94f3 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[94f4 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[94f5 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[94f6 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[94f7 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[94f8 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[94f9 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[94fa 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[94fb 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033dde0 gate 1578074261389623900 evaluation starts
[94fc 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033dde0 signed by 0 principal evaluation starts (used [false])
[94fd 01-03 17:57:41.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033dde0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[94fe 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033dde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[94ff 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033dde0 principal evaluation fails
[9500 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033dde0 gate 1578074261389623900 evaluation fails
[9501 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9502 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9503 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9504 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9505 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9506 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9507 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d6760 gate 1578074261393838800 evaluation starts
[9508 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d6760 signed by 0 principal evaluation starts (used [false])
[9509 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d6760 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[950a 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d6760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[950b 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d6760 principal evaluation fails
[950c 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d6760 gate 1578074261393838800 evaluation fails
[950d 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[950e 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[950f 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9510 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9511 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9512 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9513 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d70d0 gate 1578074261397698000 evaluation starts
[9514 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d70d0 signed by 0 principal evaluation starts (used [false])
[9515 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d70d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9516 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d70d0 principal evaluation succeeds for identity 0
[9517 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d70d0 gate 1578074261397698000 evaluation succeeds
[9518 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9519 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[951a 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[951b 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[951c 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[951d 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[951e 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[951f 01-03 17:57:41.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9520 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9521 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9522 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9523 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9524 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9525 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9526 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9527 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[9528 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[9529 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[952a 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb290 gate 1578074261401741100 evaluation starts
[952b 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb290 signed by 0 principal evaluation starts (used [false])
[952c 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb290 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[952d 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[952e 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb290 principal evaluation fails
[952f 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb290 gate 1578074261401741100 evaluation fails
[9530 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9531 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9532 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9533 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[9534 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[9535 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9536 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cbfa0 gate 1578074261403702500 evaluation starts
[9537 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cbfa0 signed by 0 principal evaluation starts (used [false])
[9538 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cbfa0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9539 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cbfa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[953a 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cbfa0 principal evaluation fails
[953b 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cbfa0 gate 1578074261403702500 evaluation fails
[953c 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[953d 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[953e 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[953f 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[9540 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[9541 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9542 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc8a0 gate 1578074261404969200 evaluation starts
[9543 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc8a0 signed by 0 principal evaluation starts (used [false])
[9544 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc8a0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9545 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc8a0 principal evaluation succeeds for identity 0
[9546 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002bc8a0 gate 1578074261404969200 evaluation succeeds
[9547 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9548 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9549 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[954a 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[954b 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[954c 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[954d 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[954e 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[954f 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9550 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9551 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9552 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9553 01-03 17:57:41.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9554 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9555 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9556 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9557 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9558 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9559 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[955a 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f030 gate 1578074261411345100 evaluation starts
[955b 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f030 signed by 0 principal evaluation starts (used [false])
[955c 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f030 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[955d 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[955e 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f030 principal evaluation fails
[955f 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f030 gate 1578074261411345100 evaluation fails
[9560 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9561 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9562 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9563 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9564 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9565 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9566 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027a1d0 gate 1578074261413710900 evaluation starts
[9567 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027a1d0 signed by 0 principal evaluation starts (used [false])
[9568 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027a1d0 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9569 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027a1d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[956a 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027a1d0 principal evaluation fails
[956b 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027a1d0 gate 1578074261413710900 evaluation fails
[956c 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[956d 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[956e 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[956f 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9570 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9571 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9572 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027b000 gate 1578074261416167300 evaluation starts
[9573 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027b000 signed by 0 principal evaluation starts (used [false])
[9574 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027b000 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9575 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027b000 principal evaluation succeeds for identity 0
[9576 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027b000 gate 1578074261416167300 evaluation succeeds
[9577 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9578 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9579 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[957a 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[957b 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[957c 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 772 bytes, Signature: 0 bytes
[957d 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[957e 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[957f 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9580 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9581 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9582 01-03 17:57:41.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9583 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9584 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9585 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9586 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9587 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9588 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9589 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213410 gate 1578074261422294100 evaluation starts
[958a 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213410 signed by 0 principal evaluation starts (used [false])
[958b 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213410 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[958c 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[958d 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213410 principal evaluation fails
[958e 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213410 gate 1578074261422294100 evaluation fails
[958f 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9590 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9591 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9592 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[9593 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[9594 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9595 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213d10 gate 1578074261423209500 evaluation starts
[9596 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213d10 signed by 0 principal evaluation starts (used [false])
[9597 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213d10 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9598 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9599 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213d10 principal evaluation fails
[959a 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000213d10 gate 1578074261423209500 evaluation fails
[959b 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[959c 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[959d 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[959e 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 b8 83 fe d7 60 6d 38 95 70 4e 4c 6a 8c ea 25 |.....`m8.pNLj..%|
00000010 6c 03 b7 be 93 93 1c b0 91 0a cb 3e b0 81 18 45 |l..........>...E|
[959f 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 cf f1 f6 bc a2 2e 08 13 2f 96 |0E.!........../.|
00000010 0f d8 1f fd 95 fd 92 70 e2 80 d4 17 d2 6d 62 5c |.......p.....mb\|
00000020 e1 84 b4 a2 ce 02 20 22 de b7 98 79 85 66 1b 70 |...... "...y.f.p|
00000030 a4 73 b8 0d 8d 2c 93 49 ed ba 30 96 3d d3 43 85 |.s...,.I..0.=.C.|
00000040 71 09 a2 e7 74 2c 7b |q...t,{|
[95a0 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[95a1 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232770 gate 1578074261423976800 evaluation starts
[95a2 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232770 signed by 0 principal evaluation starts (used [false])
[95a3 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232770 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[95a4 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232770 principal evaluation succeeds for identity 0
[95a5 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000232770 gate 1578074261423976800 evaluation succeeds
[95a6 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[95a7 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[95a8 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[95a9 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[95aa 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 48 53 d6 eb 0a 6b d5 fd 9a 38 e1 80 2f 79 53 |.HS...k...8../yS|
00000010 23 6a db 3c 6e 07 71 58 a4 99 e5 c7 0b f6 b3 3d |#j.<n.qX.......=|
[95ab 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3a 1c 7f a3 d6 b0 22 c6 85 a8 94 |0D. h:....."....|
00000010 e9 c1 be 95 fc 4c 1d 7b d0 6e 6f 43 b2 3b f2 30 |.....L.{.noC.;.0|
00000020 94 54 29 c7 02 20 34 44 8e 6c 8f 5d 12 4d 7a 3a |.T).. 4D.l.].Mz:|
00000030 40 10 7d 57 57 a1 eb f6 82 f1 ca 73 c2 25 ab cf |@.}WW......s.%..|
00000040 28 7b 5d ac e8 c3 |({]...|
[95ac 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 a8 ba 65 e5 91 14 55 9d 5d 24 a9 32 ce 2b c3 |C..e...U.]$.2.+.|
00000010 08 34 0b 02 aa a8 52 58 c3 c3 6f 90 0f ed 9b bb |.4....RX..o.....|
[95ad 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 ff 7a 77 50 5f ca 0c 1c 29 c2 d1 |0D. g.zwP_...)..|
00000010 5b 66 b3 32 87 c4 7c b9 a5 89 56 df 61 92 df c6 |[f.2..|...V.a...|
00000020 cc 72 d6 5e 02 20 32 94 db f7 b2 3b be 3d 20 74 |.r.^. 2....;.= t|
00000030 bb af 8c b0 38 01 98 47 c5 a5 8d 6d 06 94 8e d0 |....8..G...m....|
00000040 c8 ed 96 e5 c4 7f |......|
[95ae 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[95af 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[95b0 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[95b1 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[95b2 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[95b3 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[95b4 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[95b5 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[95b6 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[95b7 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[95b8 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[95b9 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263320 gate 1578074261425525500 evaluation starts
[95ba 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263320 signed by 0 principal evaluation starts (used [false])
[95bb 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263320 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[95bc 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[95bd 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263320 principal evaluation fails
[95be 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263320 gate 1578074261425525500 evaluation fails
[95bf 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[95c0 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[95c1 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[95c2 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[95c3 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[95c4 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[95c5 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263dd0 gate 1578074261426086600 evaluation starts
[95c6 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263dd0 signed by 0 principal evaluation starts (used [false])
[95c7 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263dd0 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[95c8 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[95c9 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263dd0 principal evaluation fails
[95ca 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000263dd0 gate 1578074261426086600 evaluation fails
[95cb 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[95cc 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[95cd 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[95ce 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 ab b1 9f 1b 87 bb 75 88 87 6f 23 80 0b 8e 71 |R......u..o#...q|
00000010 32 38 15 1d ec bf 3a 85 37 3b 41 f4 ca 40 b4 27 |28....:.7;A..@.'|
[95cf 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 49 be b2 8d 66 4d d7 29 06 54 e7 |0D. sI...fM.).T.|
00000010 0b 19 e0 9f 50 67 d5 85 6c 6a 05 8e d1 7e c1 0e |....Pg..lj...~..|
00000020 b6 79 58 e4 02 20 14 7c f4 3d ba 65 75 f2 6b 4a |.yX.. .|.=.eu.kJ|
00000030 94 40 55 0a 09 e9 62 a7 29 3a c4 0f 3d 41 bc 8d |.@U...b.):..=A..|
00000040 74 b0 bc d0 8a 0e |t.....|
[95d0 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[95d1 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278780 gate 1578074261429438100 evaluation starts
[95d2 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278780 signed by 0 principal evaluation starts (used [false])
[95d3 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278780 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[95d4 01-03 17:57:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278780 principal evaluation succeeds for identity 0
[95d5 01-03 17:57:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000278780 gate 1578074261429438100 evaluation succeeds
[95d6 01-03 17:57:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[95d7 01-03 17:57:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[95d8 01-03 17:57:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[95d9 01-03 17:57:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[95da 01-03 17:57:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[95db 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C0884CA8DBDA3C09CF3151063
[95dc 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE2A32C84A9D1F9C2C856A83D55B01A27446FF560121E010125D5B2A22478DE2
[95dd 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[95de 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[95df 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[95e0 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting
[95e1 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[95e3 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[95e5 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[95e4 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[95e6 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[95e7 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[95e8 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[95e9 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[95e2 01-03 17:57:41.44 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true
[95ea 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCFAFB94D1C09CF31510241801
[95eb 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6985033A944574514123D0CE7EDD9A8042669A5A911ADFF2B97A05BFB28E3CF6
[95ec 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[95ef 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[95ed 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[95f0 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[95f1 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[95f2 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[95f3 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[95f4 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 2a 32 c8 4a 9d 1f 9c 2c 85 6a 83 d5 5b 01 a2 |.*2.J...,.j..[..|
00000010 74 46 ff 56 01 21 e0 10 12 5d 5b 2a 22 47 8d e2 |tF.V.!...][*"G..|
[95f5 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 cf 95 7d 3d 87 24 58 32 c4 f9 25 |0D. ...}=.$X2..%|
00000010 61 54 8a 05 57 50 f5 cb fc ae b6 79 4f 31 1c 78 |aT..WP.....yO1.x|
00000020 72 8e da 04 02 20 26 08 d3 51 01 5b 17 2d 1d 03 |r.... &..Q.[.-..|
00000030 86 c2 29 93 b0 e0 b3 35 72 6e 61 71 58 08 2f d2 |..)....5rnaqX./.|
00000040 ec 45 5d 2a 3e e9 |.E]*>.|
[95f6 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[95ee 01-03 17:57:41.45 UTC] [%{longpkg}] %{callpath} -> DEBU c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering
[95f7 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 52 7d 80 ef 8b 1e 97 44 cf ab |0E.!..R}.....D..|
00000010 0c 80 15 ba 4a 30 63 a3 f7 8a e3 fb 6c 8e bd 04 |....J0c.....l...|
00000020 d5 69 69 2d fc 02 20 55 04 6b 18 9f 49 83 82 c5 |.ii-.. U.k..I...|
00000030 74 ab 0d 19 88 52 aa 8a be 88 24 22 5c 79 8e c0 |t....R....$"\y..|
00000040 3c d4 96 48 56 e3 84 |<..HV..|
[95f8 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[95fa 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[95fb 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[95fc 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[95f9 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[95fe 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9600 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[95ff 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[9601 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[9602 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 c0 d0 e5 16 49 22 a2 31 12 41 e6 74 4b ff 82 |d....I".1.A.tK..|
00000010 76 bf 9e f4 54 da 09 d9 7a b9 06 ed 47 c0 50 27 |v...T...z...G.P'|
[9603 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 ce 14 d1 64 2a 43 cd 24 dd 28 |0E.!.....d*C.$.(|
00000010 f1 1d 27 8b 58 d4 48 91 11 28 53 6c 83 13 99 9b |..'.X.H..(Sl....|
00000020 9f 66 88 97 24 02 20 41 d8 c6 c6 ea 79 35 1f c5 |.f..$. A....y5..|
00000030 40 3c 17 c8 e2 fd b5 68 2e 0d 7f 09 58 73 31 66 |@<.....h....Xs1f|
00000040 d1 2d 82 1a 4f 4f 98 |.-..OO.|
[95fd 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9604 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes
[9605 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9606 01-03 17:57:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9607 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9608 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[960a 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:36 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[9609 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store
[960c 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[960b 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[960d 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[960e 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1578074085552749900 seq_num:36 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[960f 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9610 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9611 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9612 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9613 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9614 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9615 01-03 17:57:41.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9616 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 dd c4 ed 0e 1e 18 ea 5b f7 ba 8b 8a bd bd 25 |........[......%|
00000010 e6 3b db 7c 97 10 9c 33 28 bd 06 5c 09 4e 6f c1 |.;.|...3(..\.No.|
[9617 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb c7 d8 40 88 92 fe 63 d8 d0 9f |0E.!....@...c...|
00000010 29 b0 2c 05 30 31 48 64 b3 79 5f 82 8c a1 6e 40 |).,.01Hd.y_...n@|
00000020 46 f3 de 0a 8c 02 20 08 af ed fb dd 75 84 50 85 |F..... .....u.P.|
00000030 99 3c d5 33 4e 87 95 d0 fc 29 2b 7d fa 4c 3f 9b |.<.3N....)+}.L?.|
00000040 93 79 72 c5 fb cf 4c |.yr...L|
[9618 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9619 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374440 gate 1578074261483518200 evaluation starts
[961a 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374440 signed by 0 principal evaluation starts (used [false])
[961b 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374440 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[961c 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[961d 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374440 principal evaluation fails
[961e 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374440 gate 1578074261483518200 evaluation fails
[961f 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9620 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9621 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9622 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 dd c4 ed 0e 1e 18 ea 5b f7 ba 8b 8a bd bd 25 |........[......%|
00000010 e6 3b db 7c 97 10 9c 33 28 bd 06 5c 09 4e 6f c1 |.;.|...3(..\.No.|
[9623 01-03 17:57:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb c7 d8 40 88 92 fe 63 d8 d0 9f |0E.!....@...c...|
00000010 29 b0 2c 05 30 31 48 64 b3 79 5f 82 8c a1 6e 40 |).,.01Hd.y_...n@|
00000020 46 f3 de 0a 8c 02 20 08 af ed fb dd 75 84 50 85 |F..... .....u.P.|
00000030 99 3c d5 33 4e 87 95 d0 fc 29 2b 7d fa 4c 3f 9b |.<.3N....)+}.L?.|
00000040 93 79 72 c5 fb cf 4c |.yr...L|
[9624 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9625 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374d60 gate 1578074261492395700 evaluation starts
[9626 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374d60 signed by 0 principal evaluation starts (used [false])
[9627 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374d60 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9628 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9629 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374d60 principal evaluation fails
[962a 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000374d60 gate 1578074261492395700 evaluation fails
[962b 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[962c 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[962d 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[962e 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 dd c4 ed 0e 1e 18 ea 5b f7 ba 8b 8a bd bd 25 |........[......%|
00000010 e6 3b db 7c 97 10 9c 33 28 bd 06 5c 09 4e 6f c1 |.;.|...3(..\.No.|
[962f 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb c7 d8 40 88 92 fe 63 d8 d0 9f |0E.!....@...c...|
00000010 29 b0 2c 05 30 31 48 64 b3 79 5f 82 8c a1 6e 40 |).,.01Hd.y_...n@|
00000020 46 f3 de 0a 8c 02 20 08 af ed fb dd 75 84 50 85 |F..... .....u.P.|
00000030 99 3c d5 33 4e 87 95 d0 fc 29 2b 7d fa 4c 3f 9b |.<.3N....)+}.L?.|
00000040 93 79 72 c5 fb cf 4c |.yr...L|
[9630 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9631 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375660 gate 1578074261494784600 evaluation starts
[9632 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375660 signed by 0 principal evaluation starts (used [false])
[9633 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375660 processing identity 0 - &{Org2MSP 27fb2d4390944b06418240659de39267947fea1c5a436a1adee7e27c4b094d22}
[9634 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375660 principal evaluation succeeds for identity 0
[9635 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375660 gate 1578074261494784600 evaluation succeeds
[9636 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9637 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9638 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9639 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[963a 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1578074073036783500 seq_num:100 , Envelope: 83 bytes, Signature: 71 bytes
[963b 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[963c 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[963d 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 2a 32 c8 4a 9d 1f 9c 2c 85 6a 83 d5 5b 01 a2 |.*2.J...,.j..[..|
00000010 74 46 ff 56 01 21 e0 10 12 5d 5b 2a 22 47 8d e2 |tF.V.!...][*"G..|
[963e 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 cf 95 7d 3d 87 24 58 32 c4 f9 25 |0D. ...}=.$X2..%|
00000010 61 54 8a 05 57 50 f5 cb fc ae b6 79 4f 31 1c 78 |aT..WP.....yO1.x|
00000020 72 8e da 04 02 20 26 08 d3 51 01 5b 17 2d 1d 03 |r.... &..Q.[.-..|
00000030 86 c2 29 93 b0 e0 b3 35 72 6e 61 71 58 08 2f d2 |..)....5rnaqX./.|
00000040 ec 45 5d 2a 3e e9 |.E]*>.|
[963f 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes
[9640 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes
[9641 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9642 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9643 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9644 01-03 17:57:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[9645 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store
[9646 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9647 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9648 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9649 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[964a 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[964b 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[964c 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[964d 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 9d bb 36 e5 df 60 73 67 d9 87 a4 fa b9 4c 0e |...6..`sg.....L.|
00000010 77 87 4c 89 39 fe 6a 08 13 9d 44 6c c8 f2 49 08 |w.L.9.j...Dl..I.|
[964e 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 62 54 e2 b1 e1 f7 1c 7b cd 78 |0E.!..bT.....{.x|
00000010 0e 03 00 3b 14 31 4f 62 0a 1a ca 8c 3a 92 2f 8b |...;.1Ob....:./.|
00000020 62 ce 4e 96 d1 02 20 06 91 16 11 5f 7f bc 5a 40 |b.N... ...._..Z@|
00000030 b4 87 85 f7 c1 c9 d2 77 c4 2c 2f 76 b7 96 17 82 |.......w.,/v....|
00000040 5c 10 61 4c ae d6 ac |\.aL...|
[964f 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9650 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089c070 gate 1578074261503053300 evaluation starts
[9651 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089c070 signed by 0 principal evaluation starts (used [false])
[9652 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089c070 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[9653 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089c070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)
[9654 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089c070 principal evaluation fails
[9655 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089c070 gate 1578074261503053300 evaluation fails
[9656 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[9657 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[9658 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9659 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 9d bb 36 e5 df 60 73 67 d9 87 a4 fa b9 4c 0e |...6..`sg.....L.|
00000010 77 87 4c 89 39 fe 6a 08 13 9d 44 6c c8 f2 49 08 |w.L.9.j...Dl..I.|
[965a 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 62 54 e2 b1 e1 f7 1c 7b cd 78 |0E.!..bT.....{.x|
00000010 0e 03 00 3b 14 31 4f 62 0a 1a ca 8c 3a 92 2f 8b |...;.1Ob....:./.|
00000020 62 ce 4e 96 d1 02 20 06 91 16 11 5f 7f bc 5a 40 |b.N... ...._..Z@|
00000030 b4 87 85 f7 c1 c9 d2 77 c4 2c 2f 76 b7 96 17 82 |.......w.,/v....|
00000040 5c 10 61 4c ae d6 ac |\.aL...|
[965b 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[965c 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca10 gate 1578074261506427000 evaluation starts
[965d 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca10 signed by 0 principal evaluation starts (used [false])
[965e 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca10 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[965f 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9660 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca10 principal evaluation fails
[9661 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089ca10 gate 1578074261506427000 evaluation fails
[9662 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9663 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9664 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9665 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 9d bb 36 e5 df 60 73 67 d9 87 a4 fa b9 4c 0e |...6..`sg.....L.|
00000010 77 87 4c 89 39 fe 6a 08 13 9d 44 6c c8 f2 49 08 |w.L.9.j...Dl..I.|
[9666 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 62 54 e2 b1 e1 f7 1c 7b cd 78 |0E.!..bT.....{.x|
00000010 0e 03 00 3b 14 31 4f 62 0a 1a ca 8c 3a 92 2f 8b |...;.1Ob....:./.|
00000020 62 ce 4e 96 d1 02 20 06 91 16 11 5f 7f bc 5a 40 |b.N... ...._..Z@|
00000030 b4 87 85 f7 c1 c9 d2 77 c4 2c 2f 76 b7 96 17 82 |.......w.,/v....|
00000040 5c 10 61 4c ae d6 ac |\.aL...|
[9667 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9668 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d340 gate 1578074261508524300 evaluation starts
[9669 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d340 signed by 0 principal evaluation starts (used [false])
[966a 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d340 processing identity 0 - &{Org2MSP 17ea5e228e4c060440825b24f0639b42397ec7485fce97cb0e04d4c424f4f41c}
[966b 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d340 principal evaluation succeeds for identity 0
[966c 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00089d340 gate 1578074261508524300 evaluation succeeds
[966d 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[966e 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[966f 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9670 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9671 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1578074073067386200 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes
[9672 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9673 01-03 17:57:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[9674 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 c0 d0 e5 16 49 22 a2 31 12 41 e6 74 4b ff 82 |d....I".1.A.tK..|
00000010 76 bf 9e f4 54 da 09 d9 7a b9 06 ed 47 c0 50 27 |v...T...z...G.P'|
[9675 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 ce 14 d1 64 2a 43 cd 24 dd 28 |0E.!.....d*C.$.(|
00000010 f1 1d 27 8b 58 d4 48 91 11 28 53 6c 83 13 99 9b |..'.X.H..(Sl....|
00000020 9f 66 88 97 24 02 20 41 d8 c6 c6 ea 79 35 1f c5 |.f..$. A....y5..|
00000030 40 3c 17 c8 e2 fd b5 68 2e 0d 7f 09 58 73 31 66 |@<.....h....Xs1f|
00000040 d1 2d 82 1a 4f 4f 98 |.-..OO.|
[9676 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes
[9677 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9678 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store
[9679 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 2a 32 c8 4a 9d 1f 9c 2c 85 6a 83 d5 5b 01 a2 |.*2.J...,.j..[..|
00000010 74 46 ff 56 01 21 e0 10 12 5d 5b 2a 22 47 8d e2 |tF.V.!...][*"G..|
[967a 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 cf 95 7d 3d 87 24 58 32 c4 f9 25 |0D. ...}=.$X2..%|
00000010 61 54 8a 05 57 50 f5 cb fc ae b6 79 4f 31 1c 78 |aT..WP.....yO1.x|
00000020 72 8e da 04 02 20 26 08 d3 51 01 5b 17 2d 1d 03 |r.... &..Q.[.-..|
00000030 86 c2 29 93 b0 e0 b3 35 72 6e 61 71 58 08 2f d2 |..)....5rnaqX./.|
00000040 ec 45 5d 2a 3e e9 |.E]*>.|
[967b 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes
[967c 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1578074073288893700 seq_num:99 , Envelope: 83 bytes, Signature: 70 bytes
[967d 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[967e 01-03 17:57:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[967f 01-03 17:57:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9680 01-03 17:57:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9681 01-03 17:57:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[9682 01-03 17:57:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9683 01-03 17:57:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9684 01-03 17:57:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16840646699593907295 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[9685 01-03 17:57:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16840646699593907295 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[9686 01-03 17:57:41.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9687 01-03 17:57:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16840646699593907295 , Msg_type: BLOCK_MSG, digests: [2 4 5 6 9 1 3 7 8], Envelope: 61 bytes, Signature: 0 bytes
[9688 01-03 17:57:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16840646699593907295 , Msg_type: BLOCK_MSG, digests: [2 4 5 6 9 1 3 7 8], Envelope: 61 bytes, Signature: 0 bytes
[9689 01-03 17:57:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16840646699593907295 , Msg_type: BLOCK_MSG, digests: [2 4 5 6 9 1 3 7 8], Envelope: 61 bytes, Signature: 0 bytes
[968a 01-03 17:57:41.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[968b 01-03 17:57:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[968c 01-03 17:57:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes
[968d 01-03 17:57:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[968e 01-03 17:57:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[968f 01-03 17:57:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9690 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9691 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9692 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9693 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9694 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store
[9695 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 42 52 a2 a5 39 67 81 c7 73 99 74 65 78 9e 82 |.BR..9g..s.tex..|
00000010 99 bd e1 de 5a 65 fb 16 04 38 8c 94 b7 8a a0 e8 |....Ze...8......|
[9696 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 e2 05 56 cd 36 92 31 0f 00 50 a0 |0D. '..V.6.1..P.|
00000010 4a b5 18 43 4e da 3b bd 9a a3 7a 66 58 13 d2 50 |J..CN.;...zfX..P|
00000020 1d da 2f a8 02 20 51 bc 93 0c 30 4d 32 91 11 65 |../.. Q...0M2..e|
00000030 79 a1 f8 64 cb db d7 5c 35 94 4a 26 2c b6 c4 ba |y..d...\5.J&,...|
00000040 c7 df 15 99 40 ac |....@.|
[9697 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[9698 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 df 32 00 b0 3c ad 75 0f 93 c0 |0E.!...2..<.u...|
00000010 42 ad dd 0b 28 d5 7f 7b dc 4b 9b 85 c7 3c 8a 1c |B...(..{.K...<..|
00000020 19 ad c4 94 92 02 20 30 34 b4 bf 61 03 9b 17 b6 |...... 04..a....|
00000030 01 36 4c 17 74 a6 d3 25 07 50 58 3c 3d 55 56 f0 |.6L.t..%.PX<=UV.|
00000040 e3 02 da c3 ef a0 72 |......r|
[9699 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[969a 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[969b 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105
[969c 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105
[969d 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:104 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[969e 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[969f 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96a0 01-03 17:57:41.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96a1 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[96a2 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[96a3 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[96a4 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[96a5 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[96a6 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[96a7 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes
[96a8 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96a9 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes
[96aa 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96ab 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes
[96ac 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96ad 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes
[96ae 01-03 17:57:41.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96af 01-03 17:57:41.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:50256 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes
[96b0 01-03 17:57:41.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96b1 01-03 17:57:41.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1578074071871625600 seq_num:105 , Envelope: 83 bytes, Signature: 70 bytes
[96b2 01-03 17:57:41.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96b3 01-03 17:57:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:898518667971778796 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[96b4 01-03 17:57:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:898518667971778796 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[96b5 01-03 17:57:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:898518667971778796 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[96b6 01-03 17:57:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 6 1 5 7 8 9] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7
[96b7 01-03 17:57:41.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[96b8 01-03 17:57:42.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:47606 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes
[96b9 01-03 17:57:42.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[96ba 01-03 17:57:42.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[96bb 01-03 17:57:42.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[96bc 01-03 17:57:42.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting